Cited By
View all- Katsis CCicala FThomsen DRingo NBertino EJoshi AFernandez MVerma R(2022)NEUTRON: A Graph-based Pipeline for Zero-trust Network ArchitecturesProceedings of the Twelfth ACM Conference on Data and Application Security and Privacy10.1145/3508398.3511499(167-178)Online publication date: 14-Apr-2022
- Washizaki HXia TKamata NFukazawa YKanuka HKato TYoshino MOkubo TOgata SKaiya HHazeyama ATanaka TYoshioka NPriyalakshmi G(2021)Systematic Literature Review of Security Pattern ResearchInformation10.3390/info1201003612:1(36)Online publication date: 16-Jan-2021
- Katsis CCicala FThomsen DRingo NBertino ELobo JDi Pietro RChowdhury O(2021)Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and TestingProceedings of the 26th ACM Symposium on Access Control Models and Technologies10.1145/3450569.3463558(165-174)Online publication date: 11-Jun-2021
- Show More Cited By