Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[2] Vijayalakshmi Atluri,et al. Meeting Cardinality Constraints in Role Mining , 2015, IEEE Transactions on Dependable and Secure Computing.
[3] Scott D. Stoller,et al. Mining Attribute-Based Access Control Policies , 2013, IEEE Transactions on Dependable and Secure Computing.
[4] Leo Breiman,et al. Technical note: Some properties of splitting criteria , 2004, Machine Learning.
[5] Vijayalakshmi Atluri,et al. Poster: Constrained Policy Mining in Attribute Based Access Control , 2017, SACMAT.
[6] Sylvia L. Osborn,et al. Current Research and Open Problems in Attribute-Based Access Control , 2017, ACM Comput. Surv..
[7] Marek Cygan,et al. Exponential-time approximation of weighted set cover , 2009, Inf. Process. Lett..
[8] Bernd Freisleben,et al. Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering , 2016, ABAC '16.
[9] Vijayalakshmi Atluri,et al. Efficient Bottom-Up Mining of Attribute Based Access Control Policies , 2017, 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC).