-
1
-
-
0001882616
-
Fast algorithms for mining association rules
-
J. B. Bocca, M. Jarke, and C. Zaniolo, editors, Morgan Kaufmann
-
R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In J. B. Bocca, M. Jarke, and C. Zaniolo, editors, Proc. 20th Int. Conf. Very Large Data Bases, VLDB, pages 487-499. Morgan Kaufmann, 1994.
-
(1994)
Proc. 20th Int. Conf. Very Large Data Bases, VLDB
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
0027629328
-
Vector quantization with complexity costs
-
J. Buhmann and H. Kühnel. Vector quantization with complexity costs. In IEEE Trans on Information Theory, volume 39, pages 1133-1145, 1993.
-
(1993)
IEEE Trans on Information Theory
, vol.39
, pp. 1133-1145
-
-
Buhmann, J.1
Kühnel, H.2
-
3
-
-
48249141905
-
A cost-driven approach to role engineering
-
Fortaleza, Ceará, Brazil
-
rd ACM Symposium on Applied Computing, SAC '08, volume 3, pages 2129-2136, Fortaleza, Ceará, Brazil, 2008.
-
(2008)
rd ACM Symposium on Applied Computing, SAC '08
, vol.3
, pp. 2129-2136
-
-
Colantonio, A.1
Di Pietro, R.2
Ocello, A.3
-
8
-
-
0002629270
-
Maximum likelihood from incomplete data via the EM algorithm
-
A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society. Series B (Methodological), 39(1):1-38, 1977.
-
(1977)
Journal of the Royal Statistical Society. Series B (Methodological)
, vol.39
, Issue.1
, pp. 1-38
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
9
-
-
84949220539
-
Engineering of role/permission assignments
-
Washington, DC, USA, IEEE Computer Society
-
P. Epstein and R. Sandhu. Engineering of role/permission assignments. In ACSAC '01: Proceedings of the 17th Annual Computer Security Applications Conference, page 127, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
ACSAC '01: Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 127
-
-
Epstein, P.1
Sandhu, R.2
-
10
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur., 4(3):224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
11
-
-
70049099334
-
A class of probabilistic models for role engineering
-
New York, NY, USA, ACM
-
M. Frank, D. Basin, and J. M. Buhmann. A class of probabilistic models for role engineering. In CCS '08: Proceedings of the 15th ACM conference on Computer and communications security, pages 299-310, New York, NY, USA, 2008. ACM.
-
(2008)
CCS '08: Proceedings of the 15th ACM conference on Computer and communications security
, pp. 299-310
-
-
Frank, M.1
Basin, D.2
Buhmann, J.M.3
-
12
-
-
33748936851
-
Formal Concept Analysis, Foundations and Applications
-
B. Ganter, G. Stumme, and R. Wille, editors, of, Springer
-
B. Ganter, G. Stumme, and R. Wille, editors. Formal Concept Analysis, Foundations and Applications, volume 3626 of Lecture Notes in Computer Science. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3626
-
-
-
13
-
-
0242625194
-
Role mining - revealing business roles for security administration using data mining technology
-
New York, NY, USA, ACM
-
M. Kuhlmann, D. Shohat, and G. Schimpf. Role mining - revealing business roles for security administration using data mining technology. In SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, pages 179-186, New York, NY, USA, 2003. ACM.
-
(2003)
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
14
-
-
57349105655
-
Mining roles with semantic meanings
-
New York, NY, USA, ACM
-
I. Molloy, H. Chen, T. Li, Q. Wang, N. Li, E. Bertino, S. Calo, and J. Lobo. Mining roles with semantic meanings. In SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 21-30, New York, NY, USA, 2008. ACM.
-
(2008)
SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies
, pp. 21-30
-
-
Molloy, I.1
Chen, H.2
Li, T.3
Wang, Q.4
Li, N.5
Bertino, E.6
Calo, S.7
Lobo, J.8
-
15
-
-
0242709332
-
A scenario-driven role engineering process for functional RBAC roles
-
New York, NY, USA, ACM
-
G. Neumann and M. Strembeck. A scenario-driven role engineering process for functional RBAC roles. In SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies, pages 33-42, New York, NY, USA, 2002. ACM.
-
(2002)
SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
, pp. 33-42
-
-
Neumann, G.1
Strembeck, M.2
-
16
-
-
70450284416
-
Automating role-based provisioning by learning from examples
-
New York, NY, USA, ACM
-
Q. Ni, J. Lobo, S. Calo, P. Rohatgi, and E. Bertino. Automating role-based provisioning by learning from examples. In SACMAT '09: Proceedings of the 14th ACM symposium on Access control models and technologies, pages 75-84, New York, NY, USA, 2009. ACM.
-
(2009)
SACMAT '09: Proceedings of the 14th ACM symposium on Access control models and technologies
, pp. 75-84
-
-
Ni, Q.1
Lobo, J.2
Calo, S.3
Rohatgi, P.4
Bertino, E.5
-
17
-
-
0033646113
-
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization
-
New York, NY, USA, ACM
-
H. Roeckle, G. Schimpf, and R. Weidinger. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control, pages 103-110, New York, NY, USA, 2000. ACM.
-
(2000)
RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control
, pp. 103-110
-
-
Roeckle, H.1
Schimpf, G.2
Weidinger, R.3
-
18
-
-
84899025015
-
Vector quantization by deterministic annealing
-
K. Rose, E. Gurewitz, and G. Fox. Vector quantization by deterministic annealing. In IEEE Trans on Information Theory, volume 38, pages 2210-2239, 1992.
-
(1992)
IEEE Trans on Information Theory
, vol.38
, pp. 2210-2239
-
-
Rose, K.1
Gurewitz, E.2
Fox, G.3
-
19
-
-
30644478631
-
Role mining with ORCA
-
New York, NY, USA, ACM
-
J. Schlegelmilch and U. Steffens. Role mining with ORCA. In SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 168-176, New York, NY, USA, 2005. ACM.
-
(2005)
SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies
, pp. 168-176
-
-
Schlegelmilch, J.1
Steffens, U.2
-
20
-
-
71149085556
-
Multi-assignment clustering for boolean data
-
Montreal, June, Omnipress
-
A. P. Streich, M. Frank, D. Basin, and J. M. Buhmann. Multi-assignment clustering for boolean data. In Proceedings of the 26th International Conference on Machine Learning, pages 969-976, Montreal, June 2009. Omnipress.
-
(2009)
Proceedings of the 26th International Conference on Machine Learning
, pp. 969-976
-
-
Streich, A.P.1
Frank, M.2
Basin, D.3
Buhmann, J.M.4
-
21
-
-
34548052480
-
The Role Mining Problem: Finding a minimal descriptive set of roles
-
Sophia Antipolis, France, ACM
-
J. Vaidya, V. Atluri, and Q. Guo. The Role Mining Problem: Finding a minimal descriptive set of roles. In The Twelth ACM Symposium on Access Control Models and Technologies, pages 175-184, Sophia Antipolis, France, 2007. ACM.
-
(2007)
The Twelth ACM Symposium on Access Control Models and Technologies
, pp. 175-184
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
-
22
-
-
34547237958
-
Roleminer: Mining roles using subset enumeration
-
New York, NY, USA, ACM
-
J. Vaidya, V. Atluri, and J. Warner. Roleminer: Mining roles using subset enumeration. In CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
-
23
-
-
34548033731
-
Role engineering using graph optimisation
-
New York, NY, USA, ACM
-
D. Zhang, K. Ramamohanarao, and T. Ebringer. Role engineering using graph optimisation. In SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, pages 139-144, New York, NY, USA, 2007. ACM.
-
(2007)
SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies
, pp. 139-144
-
-
Zhang, D.1
Ramamohanarao, K.2
Ebringer, T.3
|