-
1
-
-
70450228232
-
-
Beyond Roles: A Practical Approach to Enterprise User Provisioning. Technical report, Hitachi ID System, INC
-
Beyond Roles: A Practical Approach to Enterprise User Provisioning. Technical report, Hitachi ID System, INC.
-
-
-
-
2
-
-
21644481193
-
Rule-based rbac with negative authorization. In ACSAC
-
M. A. Al-Kahtani and R. S. Sandhu. Rule-based rbac with negative authorization. In ACSAC, pages 405-415. IEEE Computer Society, 2004.
-
(2004)
IEEE Computer Society
, pp. 405-415
-
-
Al-Kahtani, M.A.1
Sandhu, R.S.2
-
3
-
-
3042597440
-
Learning multi-label scene classification
-
M. R. Boutell, J. Luo, X. Shen, and C. M. Brown. Learning multi-label scene classification. Pattern Recognition, 37(9):1757-1771, 2004.
-
(2004)
Pattern Recognition
, vol.37
, Issue.9
, pp. 1757-1771
-
-
Boutell, M.R.1
Luo, J.2
Shen, X.3
Brown, C.M.4
-
4
-
-
0030211964
-
Bagging predictors
-
L. Breiman. Bagging predictors. Machine Learning, 24(2):123-140, 1996.
-
(1996)
Machine Learning
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
5
-
-
70450236023
-
-
C.-C. Chang and C.-J. Lin. LIBSVM: a library for support vector machines. National Taiwan University, version 2.86 edition, April 2008
-
C.-C. Chang and C.-J. Lin. LIBSVM: a library for support vector machines. National Taiwan University, version 2.86 edition, April 2008.
-
-
-
-
6
-
-
84943242305
-
Knowledge discovery in multi-label phenotype data
-
L. D. Raedt and A. Siebes, editors, PKDD, of, Springer
-
A. Clare and R. D. King. Knowledge discovery in multi-label phenotype data. In L. D. Raedt and A. Siebes, editors, PKDD, volume 2168 of Lecture Notes in Computer Science, pages 42-53. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2168
, pp. 42-53
-
-
Clare, A.1
King, R.D.2
-
7
-
-
57349100404
-
-
A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber, and R. E. Tarjan. Fast exact and heuristic methods for role minimization problems. In SACMAT 2008, pages 1-10.
-
A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber, and R. E. Tarjan. Fast exact and heuristic methods for role minimization problems. In SACMAT 2008, pages 1-10.
-
-
-
-
9
-
-
0242625194
-
-
M. Kuhlmann, D. Shohat, and G. Schimpf. Role mining - revealing business roles for security administration using data mining technology. In SACMAT 2003, pages 179-186.
-
M. Kuhlmann, D. Shohat, and G. Schimpf. Role mining - revealing business roles for security administration using data mining technology. In SACMAT 2003, pages 179-186.
-
-
-
-
10
-
-
57349105655
-
-
I. Molloy, H. Chen, T. Li, Q. Wang, N. Li, E. Bertino, S. B. Calo, and J. Lobo. Mining roles with semantic meanings. In SACMAT 2008, pages 21-30.
-
I. Molloy, H. Chen, T. Li, Q. Wang, N. Li, E. Bertino, S. B. Calo, and J. Lobo. Mining roles with semantic meanings. In SACMAT 2008, pages 21-30.
-
-
-
-
11
-
-
70450274064
-
-
E. Perkins and P. Carpenter. Magic Quadrant for User Provisioning, Aug 2008. Gartner RAS Core Research Note G00159740.
-
E. Perkins and P. Carpenter. Magic Quadrant for User Provisioning, Aug 2008. Gartner RAS Core Research Note G00159740.
-
-
-
-
12
-
-
28444445926
-
-
R Foundation for Statistical Computing, Vienna, Austria, ISBN 3-900051-07-0. Available at
-
R Development Core Team. R: a language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria, 2005. ISBN 3-900051-07-0. Available at http://www.R-project.org.
-
(2005)
R: A language and environment for statistical computing
-
-
-
13
-
-
35048898878
-
A classifier-based approach to user-role assignment for web applications
-
Secure Data Management, of, Springer
-
S. Sheng and S. L. Osborn. A classifier-based approach to user-role assignment for web applications. In Secure Data Management, volume 3178 of LNCS, pages 163-171. Springer, 2004.
-
(2004)
LNCS
, vol.3178
, pp. 163-171
-
-
Sheng, S.1
Osborn, S.L.2
-
14
-
-
14344250451
-
Support vector machine learning for interdependent and structured output spaces
-
I. Tsochantaridis, T. Hofmann, T. Joachims, and Y. Altun. Support vector machine learning for interdependent and structured output spaces. In ICML 2004.
-
(2004)
ICML
-
-
Tsochantaridis, I.1
Hofmann, T.2
Joachims, T.3
Altun, Y.4
-
15
-
-
57349117050
-
-
J. Vaidya, V. Atluri, Q. Guo, and N. R. Adam. Migrating to optimal rbac with minimal perturbation. In SACMAT 2008, pages 11-20.
-
J. Vaidya, V. Atluri, Q. Guo, and N. R. Adam. Migrating to optimal rbac with minimal perturbation. In SACMAT 2008, pages 11-20.
-
-
-
-
16
-
-
33947220823
-
Feature subset selection and ranking for data dimensionality reduction
-
H.-L. Wei and S. A. Billings. Feature subset selection and ranking for data dimensionality reduction. IEEE Trans. Pattern Anal. Mach. Intell., 29(1):162-166, 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.29
, Issue.1
, pp. 162-166
-
-
Wei, H.-L.1
Billings, S.A.2
-
18
-
-
70450243654
-
Suntrust implements role-based provisioning to a successful conclusion
-
Technical Report G00132894, Gartner RAS Core Research, Jan 12
-
R. J. Witty. Suntrust implements role-based provisioning to a successful conclusion. Technical Report G00132894, Gartner RAS Core Research, Jan 12 2006.
-
(2006)
-
-
Witty, R.J.1
|