Role based access control design using triadic concept analysis
暂无分享,去创建一个
Jinhai Li | Ch. Aswani Kumar | C. Chandrasekar | S. Chandra Mouliswaran | C. Chandrasekar | Jinhai Li | Ch. Aswani Kumar | S. C. Mouliswaran
[1] R. Wille,et al. On the modal understanding of triadic contexts , 2000 .
[2] Yanheng Liu,et al. Dynamic Policy Access Model Based on Formal Concept Analysis , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[3] Martin Knechtel,et al. Access restrictions to and with description logic web ontologies , 2010 .
[4] Rudolf Wille,et al. A Triadic Approach to Formal Concept Analysis , 1995, ICCS.
[5] Lionel C. Briand,et al. A comprehensive modeling framework for role-based access control policies , 2015, J. Syst. Softw..
[6] C. Chandrasekar,et al. Modeling Chinese wall access control using formal concept analysis , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[7] Hongwei Du,et al. Handling least privilege problem and role mining in RBAC , 2015, J. Comb. Optim..
[8] Jonas Poelmans,et al. Formal concept analysis in knowledge processing: A survey on applications , 2013, Expert Syst. Appl..
[9] Junghwa Chae. Modeling of the Role-Based Access Control Policy with Constraints Using Description Logic , 2007, ICCSA.
[10] Chen Zhao,et al. Representation and Reasoning on RBAC: A Description Logic Approach , 2005, ICTAC.
[11] George Voutsadakis,et al. Polyadic Concept Analysis , 2002, Order.
[12] Junho Choi,et al. Ontology-based access control model for security policy reasoning in cloud computing , 2013, The Journal of Supercomputing.
[13] Ravi S. Sandhu,et al. The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.
[14] Matt Bishop. Introduction to Computer Security , 2004 .
[15] Dmitry I. Ignatov,et al. Concept Learning from Triadic Data , 2014, ITQM.
[16] Bernhard Ganter,et al. Implications in Triadic Formal Contexts , 2004, ICCS.
[17] Cherukuri Aswani Kumar,et al. FUZZY CLUSTERING-BASED FORMAL CONCEPT ANALYSIS FOR ASSOCIATION RULES MINING , 2012, Appl. Artif. Intell..
[18] Jonas Poelmans,et al. Formal Concept Analysis in knowledge processing: A survey on models and techniques , 2013, Expert Syst. Appl..
[19] Ch. Aswani Kumar. Modeling Access Permissions in Role Based Access Control Using Formal Concept Analysis , 2012 .
[20] Amedeo Napoli,et al. Biclustering meets triadic concept analysis , 2013, Annals of Mathematics and Artificial Intelligence.
[21] Rudolf Wille,et al. Conceptual Graphs and Formal Concept Analysis , 1997, ICCS.
[22] Lei Li,et al. Permission and role automatic assigning of user in role-based access control , 2012 .
[23] Mohand-Said Hacid,et al. Secure Data Integration: A Formal Concept Analysis Based Approach , 2014, DEXA.
[24] Elisa Bertino,et al. The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.
[25] Ravi S. Sandhu. Role Hierarchies and Constraints for Lattice-Based Access Controls , 1996, ESORICS.
[26] Martin Milanic,et al. Group irregularity strength of connected graphs , 2015, J. Comb. Optim..
[27] Sérgio M. Dias,et al. Knowledge reduction in formal contexts using non-negative matrix factorization , 2015, Math. Comput. Simul..
[28] Jan H. P. Eloff,et al. Building access control models with attribute exploration , 2009, Comput. Secur..
[29] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[30] D. Richard Kuhn,et al. Adding Attributes to Role-Based Access Control , 2010, Computer.
[31] Edward J. Coyne,et al. ABAC and RBAC: Scalable, Flexible, and Auditable Access Management , 2013, IT Professional.
[32] Jan Konecny,et al. General Approach to Triadic Concept Analysis , 2010, CLA.
[33] Cherukuri Aswani Kumar,et al. Three-way conceptual approach for cognitive memory functionalities , 2017, Int. J. Mach. Learn. Cybern..
[34] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[35] Vadim V. Strijov,et al. Editorial of the special issue data analysis and intelligent optimization with applications , 2015, Machine Learning.
[36] C. Chandrasekar,et al. Inter-domain role based access control using ontology , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[37] Gerd Stumme,et al. A Finite State Model for On-Line Analytical Processing in Triadic Contexts , 2005, ICFCA.
[38] Radim Belohlávek,et al. Triadic concept lattices of data with graded attributes , 2012, Int. J. Gen. Syst..
[39] Guillermo Navarro-Arribas,et al. Fuzzy Role-Based Access Control , 2011, Inf. Process. Lett..
[40] Jinhai Li,et al. An information fusion technology for triadic decision contexts , 2016, Int. J. Mach. Learn. Cybern..
[41] C. Chandrasekar,et al. Representation of multiple domain role based access control using FCA , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).
[42] Bartosz Zieliński,et al. Modelling role hierarchy structure using the Formal Concept Analysis , 2010, Ann. UMCS Informatica.
[43] Andreas Hotho,et al. TRIAS--An Algorithm for Mining Iceberg Tri-Lattices , 2006, Sixth International Conference on Data Mining (ICDM'06).
[44] Cherukuri Aswani Kumar,et al. Designing role-based access control using formal concept analysis , 2013, Secur. Commun. Networks.
[45] Radim Belohlávek,et al. Triadic Concept Analysis of Data with Fuzzy Attributes , 2010, 2010 IEEE International Conference on Granular Computing.
[46] Fausto Giunchiglia,et al. Using Description Logics in Relation Based Access Control , 2009, Description Logics.
[47] Ch. Aswani Kumar,et al. Knowledge Representation Using Formal Concept Analysis: A study on Concept Generation , 2014 .
[48] Chu Kiong Loo,et al. Formal concept analysis approach to cognitive functionalities of bidirectional associative memory , 2015, BICA 2015.
[49] Cherukuri Aswani Kumar,et al. Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept Analysis , 2015, SSCC.
[50] M. Ufuk Çaglayan,et al. A formal role-based access control model for security policies in multi-domain mobile networks , 2013, Comput. Networks.
[51] Rudolf Wille,et al. The Basic Theorem of triadic concept analysis , 1995 .
[52] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[53] Stéphane Coulondre,et al. Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs , 2006, ICCS.
[54] Ch. Aswanikumar,et al. Concept lattice reduction using fuzzy K-Means clustering , 2010, Expert Syst. Appl..
[55] Sergei O. Kuznetsov,et al. Triadic Formal Concept Analysis and triclustering: searching for optimal patterns , 2015, Machine Learning.
[56] Sooyong Park,et al. A feature-based approach for modeling role-based access control systems , 2011, J. Syst. Softw..
[57] Radim Belohlávek,et al. Triadic fuzzy Galois connections as ordinary connections , 2014, Fuzzy Sets Syst..
[58] Cynthia Vera Glodeanu. Fuzzy-Valued Triadic Implications , 2011, CLA.
[59] Bernhard Ganter,et al. Formal Concept Analysis , 2013 .