Role engineering using graph optimisation
暂无分享,去创建一个
[1] Mark Strembeck,et al. A scenario-driven role engineering process for functional RBAC roles , 2002, SACMAT '02.
[2] Ulrike Steffens,et al. Role mining with ORCA , 2005, SACMAT '05.
[3] Vijay Varadharajan,et al. Role-based access control and the access control matrix , 2001, OPSR.
[4] Gerhard Schimpf,et al. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization , 2000, RBAC '00.
[5] Andreas Schaad,et al. Observations on the role life-cycle in the context of enterprise security management , 2002, SACMAT '02.
[6] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[7] Edward J. Coyne. Role engineering , 1996, RBAC '95.
[8] Martin Kuhlmann,et al. Role mining - revealing business roles for security administration using data mining technology , 2003, SACMAT '03.
[9] E. B. Fernandez,et al. Determining role rights from use cases , 1997, RBAC '97.
[10] Jaideep Vaidya,et al. RoleMiner: mining roles using subset enumeration , 2006, CCS '06.