-
1
-
-
60649096639
-
-
ANSI. American National Standard for Information Technology - Role Based Access Control. ANSI INCITS 359-2004.
-
ANSI. American National Standard for Information Technology - Role Based Access Control. ANSI INCITS 359-2004.
-
-
-
-
3
-
-
30644479770
-
Role engineering. In RBAC '95
-
New York, NY, USA, ACM Press
-
E. J. Coyne. Role engineering. In RBAC '95: Proceedings of the first ACM Workshop on Role-based access control, pages 4-5, New York, NY, USA, 1996. ACM Press.
-
(1996)
Proceedings of the first ACM Workshop on Role-based access control
, pp. 4-5
-
-
Coyne, E.J.1
-
4
-
-
57349100404
-
Fast exact and heuristic methods for role minimization problems
-
New York, NY, USA, ACM
-
A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber, and R. E. Tarjan. Fast exact and heuristic methods for role minimization problems. In SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 1-10, New York, NY, USA, 2008. ACM.
-
(2008)
SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies
, pp. 1-10
-
-
Ene, A.1
Horne, W.2
Milosavljevic, N.3
Rao, P.4
Schreiber, R.5
Tarjan, R.E.6
-
5
-
-
0031363895
-
Determining role rights from use cases. In RBAC '97
-
New York, NY, USA, ACM Press
-
E. B. Fernandez and J. C. Hawkins. Determining role rights from use cases. In RBAC '97: Proceedings of the second ACM workshop on Role-based access control, pages 121-125, New York, NY, USA, 1997. ACM Press.
-
(1997)
Proceedings of the second ACM workshop on Role-based access control
, pp. 121-125
-
-
Fernandez, E.B.1
Hawkins, J.C.2
-
6
-
-
0002357382
-
Role-Based Access Control
-
Bultimore, Maryland, USA
-
D. F. Ferraiolo and D. R. Kuhn. Role-Based Access Control. In Proceedings of the 15th NIST-NCSC National Computer Security Conference, pages 554-563, Bultimore, Maryland, USA, 1992.
-
(1992)
Proceedings of the 15th NIST-NCSC National Computer Security Conference
, pp. 554-563
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
-
9
-
-
2442449952
-
Mining frequent patterns without candidate generation: A frequent-pattern tree approach
-
J. Han, J. Pei, Y. Yin, and R. Mao. Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data Minining and Knowledge Discovery, 8(1):53-87, 2004.
-
(2004)
Data Minining and Knowledge Discovery
, vol.8
, Issue.1
, pp. 53-87
-
-
Han, J.1
Pei, J.2
Yin, Y.3
Mao, R.4
-
10
-
-
0242625194
-
Role mining - revealing business roles for security administration using data mining technology
-
New York, NY, USA, ACM Press
-
M. Kuhlmann, D. Shohat, and G. Schimpf. Role mining - revealing business roles for security administration using data mining technology. In SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, pages 179-186, New York, NY, USA, 2003. ACM Press.
-
(2003)
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
11
-
-
48349103211
-
Optimal boolean matrix decomposition: Application to role engineering
-
Cancun, Mexico, April
-
H. Lu, J. Vaidya, and V. Atluri. Optimal boolean matrix decomposition: Application to role engineering. In IEEE 24th International Conference on Data Engineering, Cancun, Mexico, April 2008.
-
(2008)
IEEE 24th International Conference on Data Engineering
-
-
Lu, H.1
Vaidya, J.2
Atluri, V.3
-
12
-
-
57349105655
-
Mining roles with semantic meanings
-
New York, NY, USA, ACM
-
I. Molloy, H. Chen, T. Li, Q. Wang, N. Li, E. Bertino, S. Calo, and J. Lobo. Mining roles with semantic meanings. In SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 21-30, New York, NY, USA, 2008. ACM.
-
(2008)
SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies
, pp. 21-30
-
-
Molloy, I.1
Chen, H.2
Li, T.3
Wang, Q.4
Li, N.5
Bertino, E.6
Calo, S.7
Lobo, J.8
-
13
-
-
0242709332
-
A scenario-driven role engineering process for functional RBAC roles
-
New York, NY, USA, ACM Press
-
G. Neumann and M. Strembeck. A scenario-driven role engineering process for functional RBAC roles. In SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies, pages 33-42, New York, NY, USA, 2002. ACM Press.
-
(2002)
SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
, pp. 33-42
-
-
Neumann, G.1
Strembeck, M.2
-
14
-
-
0033646113
-
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization
-
New York, NY, USA, ACM Press
-
H. Roeckle, G. Schimpf, and R. Weidinger. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control, pages 103-110, New York, NY, USA, 2000. ACM Press.
-
(2000)
RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control
, pp. 103-110
-
-
Roeckle, H.1
Schimpf, G.2
Weidinger, R.3
-
15
-
-
30644478631
-
Role mining with ORCA
-
New York, NY, USA, ACM Press
-
J. Schlegelmilch and U. Steffens. Role mining with ORCA. In SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 168-176, New York, NY, USA, 2005. ACM Press.
-
(2005)
SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies
, pp. 168-176
-
-
Schlegelmilch, J.1
Steffens, U.2
-
16
-
-
34548052480
-
The role mining problem: Finding a minimal descriptive set of roles
-
New York, NY, USA, ACM
-
J. Vaidya, V. Atluri, and Q. Guo. The role mining problem: finding a minimal descriptive set of roles. In SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, pages 175-184, New York, NY, USA, 2007. ACM.
-
(2007)
SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies
, pp. 175-184
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
-
17
-
-
34547237958
-
Roleminer: Mining roles using subset enumeration
-
New York, NY, USA, ACM
-
J. Vaidya, V. Atluri, and J. Warner. Roleminer: mining roles using subset enumeration. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 144-153, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM conference on Computer and communications security
, pp. 144-153
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
-
18
-
-
34548033731
-
Role engineering using graph optimisation
-
New York, NY, USA, ACM
-
D. Zhang, K. Ramamohanarao, and T. Ebringer. Role engineering using graph optimisation. In SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, pages 139-144, New York, NY, USA, 2007. ACM.
-
(2007)
SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies
, pp. 139-144
-
-
Zhang, D.1
Ramamohanarao, K.2
Ebringer, T.3
-
19
-
-
60649100599
-
-
D. Zhang, K. Ramamohanarao, and R. Zhang. Synthetic data generation for study of role engineering. http://www.cs.mu.oz.au/-zhangd/roledata, 2008.
-
D. Zhang, K. Ramamohanarao, and R. Zhang. Synthetic data generation for study of role engineering. http://www.cs.mu.oz.au/-zhangd/roledata, 2008.
-
-
-
|