Multi-user permission strategy to access sensitive information
暂无分享,去创建一个
[1] Christos Faloutsos,et al. R-MAT: A Recursive Model for Graph Mining , 2004, SDM.
[2] Salvatore J. Stolfo,et al. Lost in Translation: Improving Decoy Documents via Automated Translation , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[3] George Loizou,et al. Administrative scope: A foundation for role-based administrative models , 2003, TSEC.
[4] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[5] Christos Faloutsos,et al. Kronecker Graphs: An Approach to Modeling Networks , 2008, J. Mach. Learn. Res..
[6] Tamara G. Kolda,et al. An In-depth Study of Stochastic Kronecker Graphs , 2011, 2011 IEEE 11th International Conference on Data Mining.
[7] Jessica Lin,et al. Pattern Recognition in Time Series , 2012 .
[8] Jeffrey G. Andrews,et al. Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.
[9] Hoang Pham,et al. Toward the development of a conventional time series based web error forecasting framework , 2018, Empirical Software Engineering.
[10] Christos Faloutsos,et al. Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.
[11] Dipankar Dasgupta,et al. Adaptive Multi-factor Authentication , 2017 .
[12] Dipankar Dasgupta,et al. Toward the design of adaptive selection strategies for multi-factor authentication , 2016, Comput. Secur..
[13] Dipankar Dasgupta,et al. A fuzzy decision support system for multifactor authentication , 2018, Soft Comput..
[14] Ninghui Li,et al. On mutually-exclusive roles and separation of duty , 2004, CCS '04.
[15] Oliver Brdiczka,et al. A Bayesian Network Model for Predicting Insider Threats , 2013, 2013 IEEE Security and Privacy Workshops.
[17] David F. Gleich,et al. Moment-Based Estimation of Stochastic Kronecker Graph Parameters , 2011, Internet Math..