Some Usability Considerations in Access Control Systems
暂无分享,去创建一个
Jorge Lobo | Elisa Bertino | Hong Chen | Ninghui Li | Tiancheng Li | Ian Molloy | Seraphin Calo | Qihua Wang
[1] M. Gallaher,et al. The Economic Impact of Role-Based Access Control , 2002 .
[2] Kotagiri Ramamohanarao,et al. Role engineering using graph optimisation , 2007, SACMAT '07.
[3] Jorge Lobo,et al. Mining roles with semantic meanings , 2008, SACMAT '08.
[4] Axel Bucker. Identity Management Design Guide With IBM Tivoli Identity Manager , 2005 .
[5] Mary Ellen Zurko,et al. Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.
[6] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[7] Ulrike Steffens,et al. Role mining with ORCA , 2005, SACMAT '05.
[8] Vijayalakshmi Atluri,et al. The role mining problem: finding a minimal descriptive set of roles , 2007, SACMAT '07.
[9] Martin Kuhlmann,et al. Role mining - revealing business roles for security administration using data mining technology , 2003, SACMAT '03.
[10] Jaideep Vaidya,et al. RoleMiner: mining roles using subset enumeration , 2006, CCS '06.