-
1
-
-
0001882616
-
Fast algorithms for mining association rules
-
J. B. Bocea, M. Jarke, and C. Zaniolo, editors, Morgan Kaufmann, Dec
-
th International Conference on Very Large Data Bases, VLDB, pages 487-499. Morgan Kaufmann, Dec. 1994.
-
(1994)
th International Conference on Very Large Data Bases, VLDB
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
56749162453
-
-
ANSI/INCITS 359-2004, information technology-role based access control. Inter National Committee for Information Technology Standards (INCITS), 2004.
-
ANSI/INCITS 359-2004, information technology-role based access control. Inter National Committee for Information Technology Standards (INCITS), 2004.
-
-
-
-
3
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM 'transactions on Database Systems, 23(3):231-285, 1998.
-
(1998)
ACM 'transactions on Database Systems
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
6
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
Feb
-
D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34-64, Feb. 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
7
-
-
0002357382
-
Role-based access controls
-
Baltimore, MD, USA, Oct
-
th NIST-NSA National Computer Security Conference, pages 554-563, Baltimore, MD, USA, Oct. 1992.
-
(1992)
th NIST-NSA National Computer Security Conference
, pp. 554-563
-
-
Ferraiolo, D.F.1
Kuhn, R.2
-
8
-
-
4243280162
-
The economic impact of role-based access control
-
Technical report, Planning report 02-1, National Institute of Standards and Technology NIST
-
M. P. Gallagher, A. O'Connor, and B. Kropp. The economic impact of role-based access control. Technical report, Planning report 02-1, National Institute of Standards and Technology (NIST), 2002.
-
(2002)
-
-
Gallagher, M.P.1
O'Connor, A.2
Kropp, B.3
-
9
-
-
0242709337
-
Observations on the role life-cycle in the context of enterprise security management
-
Monterey, CA, USA, June
-
th ACM Symposium on Access Control Models and Technologies, Monterey, CA, USA, June 2002.
-
(2002)
th ACM Symposium on Access Control Models and Technologies
-
-
Kern, A.1
Kuhlmann, M.2
Schaad, A.3
Moffett, J.4
-
10
-
-
0242625194
-
Role mining revealing business roles for security administration using data mining technology
-
New York, NY, USA, ACM Press
-
th ACM Symposium, on Access Control Models and Technologies, pages 179-186, New York, NY, USA, 2003. ACM Press.
-
(2003)
th ACM Symposium, on Access Control Models and Technologies
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
13
-
-
0033646113
-
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization
-
Berlin, Germany
-
th ACM Workshop on Role-Based Access Control, volume 3, pages 103-110, Berlin, Germany, 2000.
-
(2000)
th ACM Workshop on Role-Based Access Control
, vol.3
, pp. 103-110
-
-
Röckle, H.1
Schimpf, G.2
Weidinger, R.3
-
14
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer. 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
15
-
-
56749122842
-
-
G. Schimpf. Role-engineering: Critical success factors for enterprise security administration, Dec. 2000. Position paper for [13].
-
G. Schimpf. Role-engineering: Critical success factors for enterprise security administration, Dec. 2000. Position paper for [13].
-
-
-
-
16
-
-
30644478631
-
Role mining with ORCA
-
New York, NY, USA, ACM Press
-
th ACM Symposium on Access Control Models and Technologies, pages 168-176, New York, NY, USA, 2005. ACM Press.
-
(2005)
th ACM Symposium on Access Control Models and Technologies
, pp. 168-176
-
-
Schlegelmilch, J.1
Steffens, U.2
-
17
-
-
34548052480
-
The role mining problem: Finding a minimal descriptive set of roles
-
New York, NY, USA, ACM Press
-
th ACM Symposium on Access Control Models and Technologies, pages 175-184, New York, NY, USA, 2007. ACM Press.
-
(2007)
th ACM Symposium on Access Control Models and Technologies
, pp. 175-184
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
-
18
-
-
34547237958
-
Roleminer: Mining roles using subset enumeration
-
New York, NY, USA, ACM Press
-
th ACM Conference on Computer and Communications Security, pages 144-153, New York, NY, USA, 2006. ACM Press.
-
(2006)
th ACM Conference on Computer and Communications Security
, pp. 144-153
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
-
19
-
-
33748578954
-
Computational aspects of mining maximal frequent patterns
-
G. Yang. Computational aspects of mining maximal frequent patterns. Theoretical Computer Science, 362(1):63-85, 2006.
-
(2006)
Theoretical Computer Science
, vol.362
, Issue.1
, pp. 63-85
-
-
Yang, G.1
-
20
-
-
34548033731
-
Role engineering using graph optimisation
-
New York, NY, USA, ACM Press
-
th ACM Symposium on Access Control Models and. Technologies, pages 139-144, New York, NY, USA, 2007. ACM Press.
-
(2007)
th ACM Symposium on Access Control Models and. Technologies
, pp. 139-144
-
-
Zhang, D.1
Ramamohanarao, K.2
Ebringer, T.3
|