M Aqib, RA Shaikh - International Journal of Computer Network and …, 2015 - academia.edu
Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access …
G Gil, A Arnaiz, M Higuero, FJ Diez, E Jacob - Energies, 2022 - mdpi.com
To boost data spaces and benefit from the great opportunities that they present, data sovereignty must be provided by Distributed Usage Control (DUC). Assuming that DUC will …
G Gil, A Arnaiz, M Higuero, FJ Diez, E Jacob - 2022 - researchgate.net
To boost data spaces and benefit from the great opportunities that they present, data sovereignty must be provided by Distributed Usage Control (DUC). Assuming that DUC will …