-
1
-
-
57349122480
-
Migrating to role-based access control
-
ACM, New York, NY, USA
-
K. Brooks, Migrating to role-based access control, in: RBAC'99: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, ACM, New York, NY, USA, 1999, pp. 71-81.
-
(1999)
RBAC'99: Proceedings of the Fourth ACM Workshop on Role-Based Access Control
, pp. 71-81
-
-
Brooks, K.1
-
2
-
-
30644479770
-
Role engineering
-
ACM, New York, NY, USA
-
E.J. Coyne, Role engineering, in: RBAC'95: Proceedings of the First ACM Workshop on Role-Based Access Control, ACM, New York, NY, USA, 1996, p. 4.
-
(1996)
RBAC'95: Proceedings of the First ACM Workshop on Role-Based Access Control
, pp. 4
-
-
Coyne, E.J.1
-
3
-
-
57349100404
-
Fast exact and heuristic methods for role minimization problems
-
ACM, New York, NY, USA
-
A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber and R.E. Tarjan, Fast exact and heuristic methods for role minimization problems, in: SACMAT'08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 2008, pp. 1-10.
-
(2008)
SACMAT'08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 1-10
-
-
Ene, A.1
Horne, W.2
Milosavljevic, N.3
Rao, P.4
Schreiber, R.5
Tarjan, R.E.6
-
4
-
-
84949220539
-
Engineering of role/permission assignments
-
IEEE Computer Society, Washington, DC, USA
-
P. Epstein and R. Sandhu, Engineering of role/permission assignments, in: ACSAC'01: Proceedings of the 17th Annual Computer Security Applications Conference, IEEE Computer Society, Washington, DC, USA, 2001, pp. 127-136.
-
(2001)
ACSAC'01: Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 127-136
-
-
Epstein, P.1
Sandhu, R.2
-
5
-
-
0031363895
-
Determining role rights from use cases
-
ACM, New York, NY, USA
-
E.B. Fernandez and J.C. Hawkins, Determining role rights from use cases, in: RBAC'97: Proceedings of the Second ACM Workshop on Role-Based Access Control, ACM, New York, NY, USA, 1997, pp. 121-125.
-
(1997)
RBAC'97: Proceedings of the Second ACM Workshop on Role-Based Access Control
, pp. 121-125
-
-
Fernandez, E.B.1
Hawkins, J.C.2
-
6
-
-
84992227458
-
Proposed nist standard for role-based access control
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn and R. Chandramouli, Proposed nist standard for role-based access control, ACM Trans. Inf. Syst. Secur. 4(3) (2001), 224-274.
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
7
-
-
4243280162
-
The economic impact of role-based access control
-
02-1, National Institute of Standards and Technology, March
-
M.P. Gallagher, A.C. O'Connor and B. Kropp, The economic impact of role-based access control, Planning Report 02-1, National Institute of Standards and Technology, March 2002.
-
(2002)
Planning Report
-
-
Gallagher, M.P.1
O'Connor, A.C.2
Kropp, B.3
-
8
-
-
0003603813
-
-
Ch. 3, W.H. Freeman, New York, NY, USA
-
M.R. Garey and D.S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, Ch. 3, W.H. Freeman, New York, NY, USA, 1979.
-
(1979)
Computers and Intractability: A Guide to the Theory of NP-Completeness
-
-
Garey, M.R.1
Johnson, D.S.2
-
9
-
-
60649115442
-
The role hierarchy mining problem: Discovery of optimal role hierarchies
-
Anaheim, CA, USA, December 8-12
-
Q. Guo, J. Vaidya and V. Atluri, The role hierarchy mining problem: Discovery of optimal role hierarchies, in: Proceedings of the 24th Annual Computer Security Applications Conference, Anaheim, CA, USA, December 8-12, 2008.
-
(2008)
Proceedings of the 24th Annual Computer Security Applications Conference
-
-
Guo, Q.1
Vaidya, J.2
Atluri, V.3
-
10
-
-
0027796975
-
Minimal nfa problems are hard
-
T. Jiang and B. Ravikumar, Minimal nfa problems are hard, SIAM J. Comput. 22(6) (1993), 1117-1141.
-
(1993)
SIAM J. Comput
, vol.22
, Issue.6
, pp. 1117-1141
-
-
Jiang, T.1
Ravikumar, B.2
-
11
-
-
0242709337
-
Observations on the role life-cycle in the context of enterprise security management
-
ACM, New York, NY, USA
-
A. Kern, M. Kuhlmann, A. Schaad and J. Moffett, Observations on the role life-cycle in the context of enterprise security management, in: SACMAT'02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 2002, pp. 43-51.
-
(2002)
SACMAT'02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies
, pp. 43-51
-
-
Kern, A.1
Kuhlmann, M.2
Schaad, A.3
Moffett, J.4
-
12
-
-
0242625194
-
Role mining - revealing business roles for security administration using data mining technology
-
ACM, New York, NY, USA
-
M. Kuhlmann, D. Shohat and G. Schimpf, Role mining - revealing business roles for security administration using data mining technology, in: SACMAT'03: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 2003, pp. 179-186.
-
(2003)
SACMAT'03: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
13
-
-
48349103211
-
Optimal Boolean matrix decomposition: Application to role engineering
-
Cancun, Mexico
-
H. Lu, J. Vaidya and V. Atluri, Optimal Boolean matrix decomposition: Application to role engineering, in: Proceedings of the 24th International Conference on Data Engineering (ICDE), Cancun, Mexico, 2008, pp. 297-306.
-
(2008)
Proceedings of the 24th International Conference on Data Engineering (ICDE)
, pp. 297-306
-
-
Lu, H.1
Vaidya, J.2
Atluri, V.3
-
14
-
-
67651212353
-
-
T. Mielikäinen, Intersecting data to closed sets with constraints, in: FIMI, CEUR Workshop Proceedings, 90, B. Goethals and M.J. Zaki, eds, CEUR, Melbourne, FL, USA, 2003.
-
T. Mielikäinen, Intersecting data to closed sets with constraints, in: FIMI, CEUR Workshop Proceedings, Vol. 90, B. Goethals and M.J. Zaki, eds, CEUR, Melbourne, FL, USA, 2003.
-
-
-
-
16
-
-
33750356685
-
-
P. Miettinen, T. Mielikainen, A. Gionis, G. Das and H. Mannila, The discrete basis problem, in: Knowledge Discovery in Databases: PKDD 2006, Lecture Notes in Artificial Intelligence, Springer, New York, NY, USA, 2006, pp. 335-346 (online). Available: http://www.springerlink.com/content/ 31456146v6r72218.
-
P. Miettinen, T. Mielikainen, A. Gionis, G. Das and H. Mannila, The discrete basis problem, in: Knowledge Discovery in Databases: PKDD 2006, Lecture Notes in Artificial Intelligence, Springer, New York, NY, USA, 2006, pp. 335-346 (online). Available: http://www.springerlink.com/content/ 31456146v6r72218.
-
-
-
-
17
-
-
57349105655
-
Mining roles with semantic meanings
-
ACM, New York, NY, USA
-
I. Molloy, H. Chen, T. Li, Q. Wang, N. Li, E. Bertino, S. Calo and J. Lobo, Mining roles with semantic meanings, in: SACMAT'08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 2008, pp. 21-30.
-
(2008)
SACMAT'08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 21-30
-
-
Molloy, I.1
Chen, H.2
Li, T.3
Wang, Q.4
Li, N.5
Bertino, E.6
Calo, S.7
Lobo, J.8
-
18
-
-
0242709332
-
A scenario-driven role engineering process for functional rbac roles
-
ACM, New York, NY, USA
-
G. Neumann and M. Strembeck, A scenario-driven role engineering process for functional rbac roles, in: SACMAT'02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 2002, pp. 33-42.
-
(2002)
SACMAT'02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies
, pp. 33-42
-
-
Neumann, G.1
Strembeck, M.2
-
19
-
-
77952367051
-
-
F. Pan, G. Cong, A.K.H. Tung, J. Yang and M.J. Zaki, Carpenter: finding closed patterns in long biological datasets, in: KDD, Washington, DC, USA, 2003, pp. 637-642.
-
F. Pan, G. Cong, A.K.H. Tung, J. Yang and M.J. Zaki, Carpenter: finding closed patterns in long biological datasets, in: KDD, Washington, DC, USA, 2003, pp. 637-642.
-
-
-
-
20
-
-
0033646113
-
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization
-
ACM, New York, NY, USA
-
H. Roeckle, G. Schimpf and R. Weidinger, Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization, in: RBAC'00: Proceedings of the Fifth ACM Workshop on Role-Based Access Control, ACM, New York, NY, USA, 2000, pp. 103-110.
-
(2000)
RBAC'00: Proceedings of the Fifth ACM Workshop on Role-Based Access Control
, pp. 103-110
-
-
Roeckle, H.1
Schimpf, G.2
Weidinger, R.3
-
21
-
-
0030086382
-
Role-based access control models
-
online, Available
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein and C.E. Youman, Role-based access control models, IEEE Comput. 29(2) (1996), 38-47 (online). Available: citeseer.ist.psu.edu/sandhu96rolebased.html.
-
(1996)
IEEE Comput
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
22
-
-
0035790675
-
The role-based access control system of a european bank: A case study and discussion
-
ACM, New York, NY, USA
-
A. Schaad, J. Moffett and J. Jacob, The role-based access control system of a european bank: a case study and discussion, in: SACMAT'01: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 2001, pp. 3-9.
-
(2001)
SACMAT'01: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 3-9
-
-
Schaad, A.1
Moffett, J.2
Jacob, J.3
-
23
-
-
30644478631
-
Role mining with orca
-
ACM, New York, NY, USA
-
J. Schlegelmilch and U. Steffens, Role mining with orca, in: SACMAT'05: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 2005, pp. 168-176.
-
(2005)
SACMAT'05: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies
, pp. 168-176
-
-
Schlegelmilch, J.1
Steffens, U.2
-
24
-
-
0242625196
-
On modeling system-centric information for role engineering
-
ACM, New York, NY, USA
-
D. Shin, G.-J. Ahn, S. Cho and S. Jin, On modeling system-centric information for role engineering, in: SACMAT'03: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 2003, pp. 169-178.
-
(2003)
SACMAT'03: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
, pp. 169-178
-
-
Shin, D.1
Ahn, G.-J.2
Cho, S.3
Jin, S.4
-
25
-
-
84982871639
-
Role-based access control framework for network enterprises
-
IEEE Computer Society, Washington, DC, USA
-
D. Thomsen, R. O'Brien and J. Bogle, Role-based access control framework for network enterprises, in: ACSAC'98: Proceedings of the 14th Annual Computer Security Applications Conference, IEEE Computer Society, Washington, DC, USA, 1998, pp. 50-58.
-
(1998)
ACSAC'98: Proceedings of the 14th Annual Computer Security Applications Conference
, pp. 50-58
-
-
Thomsen, D.1
O'Brien, R.2
Bogle, J.3
-
26
-
-
34548052480
-
The role mining problem: Finding a minimal descriptive set of roles
-
ACM, New York, NY, USA
-
J. Vaidya, V. Atluri and Q. Guo, The role mining problem: finding a minimal descriptive set of roles, in: SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 2007, pp. 175-184.
-
(2007)
SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 175-184
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
-
28
-
-
57349117050
-
Migrating to optimal rbac with minimal perturbation
-
ACM, New York, NY, USA
-
J. Vaidya, V. Atluri, Q. Guo and N. Adam, Migrating to optimal rbac with minimal perturbation, in: SACMAT'08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 2008, pp. 11-20.
-
(2008)
SACMAT'08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 11-20
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
Adam, N.4
-
29
-
-
34547237958
-
Roleminer: Finding roles using subset enumeration
-
Alexandria, VA, USA, November 1-3
-
J. Vaidya, V. Atluri and J. Warner, Roleminer: Finding roles using subset enumeration, in: The Thirteenth ACM Conference on Computer and Communications Security, Alexandria, VA, USA, November 1-3, 2006.
-
(2006)
The Thirteenth ACM Conference on Computer and Communications Security
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
-
31
-
-
34548033731
-
Role engineering using graph optimisation
-
ACM, New York, NY, USA
-
D. Zhang, K. Ramamohanarao and T. Ebringer, Role engineering using graph optimisation, in: SAC-MAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, 2007, pp. 139-144.
-
(2007)
SAC-MAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 139-144
-
-
Zhang, D.1
Ramamohanarao, K.2
Ebringer, T.3
|