Set Covering Problems in Role-Based Access Control
暂无分享,去创建一个
[1] James B. D. Joshi,et al. UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints , 2008, SACMAT '08.
[2] Jason Crampton,et al. Inter-domain role mapping and least privilege , 2007, SACMAT '07.
[3] David S. Johnson,et al. Approximation algorithms for combinatorial problems , 1973, STOC.
[4] Vasek Chvátal,et al. A Greedy Heuristic for the Set-Covering Problem , 1979, Math. Oper. Res..
[5] Hong Chen,et al. Constraint generation for separation of duty , 2006, SACMAT '06.
[6] Ninghui Li,et al. An efficient framework for user authorization queries in RBAC systems , 2009, SACMAT '09.
[7] James B. D. Joshi,et al. Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy , 2006, SACMAT '06.
[8] Ninghui Li,et al. On mutually-exclusive roles and separation of duty , 2004, CCS '04.
[9] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[10] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.