Optimal Boolean Matrix Decomposition: Application to Role Engineering
暂无分享,去创建一个
[1] Kotagiri Ramamohanarao,et al. Role engineering using graph optimisation , 2007, SACMAT '07.
[2] Ulrike Steffens,et al. Role mining with ORCA , 2005, SACMAT '05.
[3] M. Gallaher,et al. The Economic Impact of Role-Based Access Control , 2002 .
[4] Pauli Miettinen,et al. The Discrete Basis Problem , 2006, IEEE Transactions on Knowledge and Data Engineering.
[5] Martin Kuhlmann,et al. Role mining - revealing business roles for security administration using data mining technology , 2003, SACMAT '03.
[6] Andreas Schaad,et al. Observations on the role life-cycle in the context of enterprise security management , 2002, SACMAT '02.
[7] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[8] Taneli Mielikäinen. Intersecting data to closed sets with constraints , 2003, FIMI.
[9] Jaideep Vaidya,et al. RoleMiner: mining roles using subset enumeration , 2006, CCS '06.
[10] Vijayalakshmi Atluri,et al. The role mining problem: finding a minimal descriptive set of roles , 2007, SACMAT '07.
[11] Michael P. Gallaher,et al. Planning Report 02-1: The Economic Impact of Role-Based Access Control | NIST , 2002 .
[12] Edward J. Coyne. Role engineering , 1996, RBAC '95.
[13] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[14] Jeremy L. Jacob,et al. The role-based access control system of a European bank: a case study and discussion , 2001, SACMAT '01.
[15] Alexander Schrijver,et al. Theory of linear and integer programming , 1986, Wiley-Interscience series in discrete mathematics and optimization.
[16] Elisa Bertino,et al. The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.
[17] Bart Goethals,et al. Tiling Databases , 2004, Discovery Science.