Poster: Constrained Policy Mining in Attribute Based Access Control
暂无分享,去创建一个
Vijayalakshmi Atluri | Jaideep Vaidya | Shamik Sural | Sadhana Jha | Mayank Gautam | V. Atluri | S. Sural | Jaideep Vaidya | S. Jha | M. Gautam
[1] Sylvia L. Osborn,et al. Current Research and Open Problems in Attribute-Based Access Control , 2017, ACM Comput. Surv..
[2] Marek Cygan,et al. Exponential-time approximation of weighted set cover , 2009, Inf. Process. Lett..
[3] Bernd Freisleben,et al. Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering , 2016, ABAC '16.
[4] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[5] Vijayalakshmi Atluri,et al. Meeting Cardinality Constraints in Role Mining , 2015, IEEE Transactions on Dependable and Secure Computing.
[6] Scott D. Stoller,et al. Mining Attribute-Based Access Control Policies , 2013, IEEE Transactions on Dependable and Secure Computing.