Accelerating the Deployment of Security Service Infrastructure with Collective Intelligence and Analytics
暂无分享,去创建一个
[1] Kumar Bhaskaran,et al. Privileged identity management in enterprise service-hosting environments , 2012, 2012 IEEE Network Operations and Management Symposium.
[2] American National Standard for Information Technology – Role Based Access Control , 2004 .
[3] Osamuyimen Stewart,et al. Designing crowdsourcing community for the enterprise , 2009, HCOMP '09.
[4] Jim Laredo,et al. Service for Crowd-Driven Gathering of Non-Discoverable Knowledge , 2011, ICSOC Workshops.
[5] Edward J. Coyne. Role engineering , 1996, RBAC '95.
[6] Ross Smith. Using games to improve productivity in software engineering , 2010, HCOMP '10.
[7] Martin Kuhlmann,et al. Role mining - revealing business roles for security administration using data mining technology , 2003, SACMAT '03.
[8] Daren C. Brabham. Crowdsourcing as a Model for Problem Solving , 2008 .
[9] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[10] Edward J. Coyne,et al. Role Engineering for Enterprise Security Management , 2007 .
[11] Jorge Lobo,et al. Towards an integrated approach to role engineering , 2010, SafeConfig '10.
[12] Charles L. Smith. NIST National Institute of Standards and Technology Small Business Innovation Research ( SBIR ) A Marketing Survey of Civil Federal Government Organizations to Determine the Need for a Role-Based Access Control ( RBAC ) Security Product SETA , 2008 .