-
2
-
-
57349199002
-
-
Nov
-
A. Buecker, J. C. Palacios, B. Davis, T. Hastings, and I. Yip. Identity management design guide with ibm tivoli identity manager, Nov. 2005.
-
(2005)
Identity management design guide with ibm tivoli identity manager
-
-
Buecker, A.1
Palacios, J.C.2
Davis, B.3
Hastings, T.4
Yip, I.5
-
4
-
-
4243280162
-
The economic impact of roled-ased access control
-
02-1, National Institute of Standards and Technology, Mar
-
M. P. Gallaher, A. C. O'Connor, and B. Kropp. The economic impact of roled-ased access control. Planning Report 02-1, National Institute of Standards and Technology, Mar. 2002.
-
(2002)
Planning Report
-
-
Gallaher, M.P.1
O'Connor, A.C.2
Kropp, B.3
-
6
-
-
0242625194
-
Role mining -revealing business roles for security administration using data mining technology
-
New York, NY, USA, ACM Press
-
M. Kuhlmann, D. Shohat, and G. Schimpf. Role mining -revealing business roles for security administration using data mining technology. In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), pages 179-186, New York, NY, USA, 2003. ACM Press.
-
(2003)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
8
-
-
0242709332
-
A scenario-driven role engineering process for functional rbac roles
-
New York, NY, USA, ACM Press
-
G. Neumann and M. Strembeck. A scenario-driven role engineering process for functional rbac roles. In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), pages 33-42, New York, NY, USA, 2002. ACM Press.
-
(2002)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 33-42
-
-
Neumann, G.1
Strembeck, M.2
-
9
-
-
0033646113
-
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization
-
H. Roeckle, G. Schimpf, and R. Weidinger. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In Proc. ACM Workshop on Role-Based Access Control (RBAC), pages 103-110, 2000.
-
(2000)
Proc. ACM Workshop on Role-Based Access Control (RBAC)
, pp. 103-110
-
-
Roeckle, H.1
Schimpf, G.2
Weidinger, R.3
-
10
-
-
30644478631
-
Role mining with ORCA
-
New York, NY, USA, ACM Press
-
J. Schlegelmileh and U. Steffens. Role mining with ORCA. In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), pages 168-176, New York, NY, USA, 2005. ACM Press.
-
(2005)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 168-176
-
-
Schlegelmileh, J.1
Steffens, U.2
-
11
-
-
0242625196
-
On modeling system-centric information for role engineering
-
New York, NY, USA, ACM Press
-
D. Shin, G.-J. Ahn, S. Cho, and S. Jin. On modeling system-centric information for role engineering. In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), pages 169-178, New York, NY, USA, 2003. ACM Press.
-
(2003)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 169-178
-
-
Shin, D.1
Ahn, G.-J.2
Cho, S.3
Jin, S.4
-
13
-
-
34548052480
-
The role mining problem: Finding a minimal descriptive set of roles
-
New York, NY, USA, ACM Press
-
J. Vaidya, V. Atluri, and Q. Guo. The role mining problem: Finding a minimal descriptive set of roles. In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), New York, NY, USA, 2007. ACM Press.
-
(2007)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
-
14
-
-
34547237958
-
Roleminer: Mining roles using subset enumeration. In Pmc
-
New York, NY, USA, ACM Press
-
J. Vaidya, V. Atluri, and J. Warner. Roleminer: Mining roles using subset enumeration. In Pmc. ACM Conference on Computer and Communications Security (CCS), pages 144-153, New York, NY, USA, 2006. ACM Press.
-
(2006)
ACM Conference on Computer and Communications Security (CCS)
, pp. 144-153
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
|