Crossref Citations
                  
                    
                    
                      
                        This article has been cited by the following publications. This list is generated based on data provided by 
    Crossref.
                     
                   
                  
                        
                          
                                
                                
                                    
                                    Caracciolo di Forino, Alfonso
                                  1964.
                                  N-Ary selection functions and formal selective systems. Part I.
                                  
                                  
                                  Calcolo, 
                                  Vol. 1, 
                                  Issue. 1, 
                                
                                    p. 
                                    49.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    Ivas'kiv, Yu. L.
                                    
                                    Pospelov, D. A.
                                     and 
                                    Toshich, Zh.
                                  1972.
                                  Representations in many-valued logics.
                                  
                                  
                                  Cybernetics, 
                                  Vol. 5, 
                                  Issue. 2, 
                                
                                    p. 
                                    163.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    rosenberg, ivo g.
                                  1977.
                                  Computer Science and Multiple-Valued Logic.
                                  
                                  
                                  
                                  
                                  
                                
                                    p. 
                                    144.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    Gaines, B.R.
                                     and 
                                    Kohout, L.J.
                                  1977.
                                  The fuzzy decade: a bibliography of fuzzy systems and closely related topics.
                                  
                                  
                                  International Journal of Man-Machine Studies, 
                                  Vol. 9, 
                                  Issue. 1, 
                                
                                    p. 
                                    1.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    Ni, Qun
                                    
                                    Bertino, Elisa
                                     and 
                                    Lobo, Jorge
                                  2009.
                                  D-algebra for composing access control policy decisions.
                                  
                                  
                                  
                                  
                                  
                                
                                    p. 
                                    298.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    Crampton, Jason
                                     and 
                                    Morisset, Charles
                                  2012.
                                  Principles of Security and Trust.
                                  
                                  
                                  
                                  Vol. 7215, 
                                  Issue. , 
                                
                                    p. 
                                    390.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    Griesmayer, Andreas
                                     and 
                                    Morisset, Charles
                                  2013.
                                  Computer Security – ESORICS 2013.
                                  
                                  
                                  
                                  Vol. 8134, 
                                  Issue. , 
                                
                                    p. 
                                    574.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    Ciucci, D.
                                     and 
                                    Dubois, D.
                                  2013.
                                  A map of dependencies among three-valued logics.
                                  
                                  
                                  Information Sciences, 
                                  Vol. 250, 
                                  Issue. , 
                                
                                    p. 
                                    162.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    Morisset, Charles
                                     and 
                                    Zannone, Nicola
                                  2014.
                                  Reduction of access control decisions.
                                  
                                  
                                  
                                  
                                  
                                
                                    p. 
                                    53.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    Crampton, Jason
                                     and 
                                    Williams, Conrad
                                  2016.
                                  On Completeness in Languages for Attribute-Based Access Control.
                                  
                                  
                                  
                                  
                                  
                                
                                    p. 
                                    149.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    Crampton, Jason
                                     and 
                                    Williams, Conrad
                                  2017.
                                  Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control.
                                  
                                  
                                  
                                  
                                  
                                
                                    p. 
                                    47.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    Crampton, Jason
                                     and 
                                    Williams, Conrad
                                  2017.
                                  Attribute Expressions, Policy Tables and Attribute-Based Access Control.
                                  
                                  
                                  
                                  
                                  
                                
                                    p. 
                                    79.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    Sheikhalishahi, Mina
                                    
                                    Tillem, Gamze
                                    
                                    Erkin, Zekeriya
                                     and 
                                    Zannone, Nicola
                                  2019.
                                  Privacy-Preserving Multi-Party Access Control.
                                  
                                  
                                  
                                  
                                  
                                
                                    p. 
                                    1.
                                
                                
                        
                        
                        
                        
      
                          
                                
                                
                                    
                                    Sheikhalishahi, Mina
                                    
                                    Stork, Ischa
                                     and 
                                    Zannone, Nicola
                                  2021.
                                  Privacy-preserving policy evaluation in multi-party access control.
                                  
                                  
                                  Journal of Computer Security, 
                                  Vol. 29, 
                                  Issue. 6, 
                                
                                    p. 
                                    613.