Realizing Information Flow Control in ABAC Mining
暂无分享,去创建一个
[1] R. K. Shyamasundar,et al. A Complete Generative Label Model for Lattice-Based Access Control Models , 2017, SEFM.
[2] R. K. Shyamasundar,et al. Towards Unifying RBAC with Information Flow Control , 2021, SACMAT.
[3] Vijayalakshmi Atluri,et al. A Framework for Policy Similarity Evaluation and Migration Based on Change Detection , 2015, NSS.
[4] Vijayalakshmi Atluri,et al. Poster: Constrained Policy Mining in Attribute Based Access Control , 2017, SACMAT.
[5] Ravi S. Sandhu,et al. The authorization leap from rights to attributes: maturation or chaos? , 2012, SACMAT '12.
[6] Sylvia L. Osborn. Information flow analysis of an RBAC system , 2002, SACMAT '02.
[7] Sylvia L. Osborn,et al. Modeling Mandatory Access Control in Role-Based Security Systems , 1995, DBSec.
[8] Ravi S. Sandhu,et al. Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy , 2016, ABAC '16.
[9] Mikhail I. Gofman,et al. RBAC-PAT: A Policy Analysis Tool for Role Based Access Control , 2009, TACAS.
[10] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[11] Ehud Gudes,et al. Resolving Information Flow Conflicts in RBAC Systems , 2006, DBSec.
[12] Xin Jin,et al. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.
[13] Yingjiu Li,et al. An attribute-based access matrix model , 2005, SAC '05.
[14] Scott D. Stoller,et al. Mining Attribute-Based Access Control Policies from Logs , 2014, DBSec.
[15] Ram Krishnan,et al. On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis , 2019, SKM.
[16] Sushil Jajodia,et al. A logic-based framework for attribute based access control , 2004, FMSE '04.
[17] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.
[18] Ravi S. Sandhu. Role Hierarchies and Constraints for Lattice-Based Access Controls , 1996, ESORICS.