메뉴 건너뛰기




Volumn , Issue , 2009, Pages 95-104

Evaluating role mining algorithms

Author keywords

Evaluation; RBAC; Role engineering; Role mining

Indexed keywords

CLASS 1; COMPREHENSIVE STUDIES; DATA SETS; EVALUATION; EVALUATION CRITERIA; MINING ALGORITHMS; REAL DATA SETS; ROLE ENGINEERING;

EID: 70450248454     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1542207.1542224     Document Type: Conference Paper
Times cited : (116)

References (20)
  • 12
    • 0033646113 scopus 로고    scopus 로고
    • Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization
    • H. Roeckle, G. Schimpf, and R. Weidinger. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In Proc. ACM Workshop on Role-Based Access Control (RBAC), 2000.
    • (2000) Proc. ACM Workshop on Role-Based Access Control (RBAC)
    • Roeckle, H.1    Schimpf, G.2    Weidinger, R.3
  • 13
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9
    • Saltzer, J.H.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.