-
1
-
-
30644462262
-
-
American National Standards Institute (ANSI) and InterNational Committee for Information Technology Standards (INCITS): ANSI/INCITS 359-2004
-
American National Standards Institute (ANSI) and InterNational Committee for Information Technology Standards (INCITS): ANSI/INCITS 359-2004, Information Technology-Role Based Access Control (2004)
-
(2004)
Information Technology-Role Based Access Control
-
-
-
2
-
-
0002909354
-
The chromatic number of random graphs
-
Bollobás, B.: The chromatic number of random graphs. Combinatorica 8(1), 49-55 (1988)
-
(1988)
Combinatorica
, vol.8
, Issue.1
, pp. 49-55
-
-
Bollobás, B.1
-
3
-
-
48249141905
-
A cost-driven approach to role engineering
-
In: SAC 2008, Fortaleza, Ceará, Brazil, vol. 3
-
Colantonio, A., Di Pietro, R., Ocello, A.: A cost-driven approach to role engineering. In: Proceedings of the 23rd ACM Symposium on Applied Computing, SAC 2008, Fortaleza, Ceará, Brazil, vol. 3, pp. 2129-2136 (2008)
-
(2008)
Proceedings of the 23rd ACM Symposium on Applied Computing
, pp. 2129-2136
-
-
Colantonio, A.1
Di Pietro, R.2
Ocello, A.3
-
4
-
-
48249156932
-
Leveraging lattices to improve role mining
-
In: SEC 2008. IFIP International Federation for Information Processing, vol. 278,. Springer, Heidelberg
-
Colantonio, A., Di Pietro, R., Ocello, A.: Leveraging lattices to improve role mining. In: Proceedings of the IFIP TC 11 23rd International Information Security Conference, SEC 2008. IFIP International Federation for Information Processing, vol. 278, pp. 333-347. Springer, Heidelberg (2008)
-
(2008)
Proceedings of the IFIP TC 11 23rd International Information Security Conference
, pp. 333-347
-
-
Colantonio, A.1
Di Pietro, R.2
Ocello, A.3
-
5
-
-
30644479770
-
Role engineering
-
In: Gaithersburg, Maryland, United States, ACM, New York
-
Coyne, E.J.: Role engineering. In: RBAC 1995: Proceedings of the first ACM Workshop on Role-based access control, Gaithersburg, Maryland, United States, p. 4. ACM, New York (1996)
-
(1996)
RBAC 1995: Proceedings of the first ACM Workshop on Role-based access control
, pp. 4
-
-
Coyne, E.J.1
-
7
-
-
57349100404
-
Fast exact and heuristic methods for role minimization problems
-
In: SACMAT 2008
-
Ene, A., Horne, W., Milosavljevic, N., Rao, P., Schreiber, R., Tarjan, R.E.: Fast exact and heuristic methods for role minimization problems. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, pp. 1-10 (2008)
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 1-10
-
-
Ene, A.1
Horne, W.2
Milosavljevic, N.3
Rao, P.4
Schreiber, R.5
Tarjan, R.E.6
-
8
-
-
70049099334
-
A class of probabilistic models for role engineering
-
In: CCS 2008
-
Frank, M., Basin, D., Buhmann, J.M.: A class of probabilistic models for role engineering. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 299-310 (2008)
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 299-310
-
-
Frank, M.1
Basin, D.2
Buhmann, J.M.3
-
9
-
-
35048813595
-
Tiling databases
-
In: Suzuki, E., Arikawa, S. (eds.) Springer, Heidelberg
-
Geerts, F., Goethals, B., Mielikäinen, T.: Tiling databases. In: Suzuki, E., Arikawa, S. (eds.) DS 2004. LNCS, vol. 3245, pp. 278-289. Springer, Heidelberg (2004)
-
(2004)
DS 2004. LNCS
, vol.3245
, pp. 278-289
-
-
Geerts, F.1
Goethals, B.2
Mielikäinen, T.3
-
12
-
-
0242625194
-
Role mining-revealing business roles for security administration using data mining technology
-
In: SACMAT 2003
-
Kuhlmann, M., Shohat, D., Schimpf, G.: Role mining-revealing business roles for security administration using data mining technology. In: Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, pp. 179-186 (2003)
-
(2003)
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
13
-
-
48349103211
-
Optimal boolean matrix decomposition: Application to role engineering
-
In: ICDE 2008
-
Lu, H., Vaidya, J., Atluri, V.: Optimal boolean matrix decomposition: Application to role engineering. In: Proceedings of the 24th IEEE International Conferene on Data Engineering, ICDE 2008, pp. 297-306 (2008)
-
(2008)
Proceedings of the 24th IEEE International Conferene on Data Engineering
, pp. 297-306
-
-
Lu, H.1
Vaidya, J.2
Atluri, V.3
-
14
-
-
34249925281
-
The chromatic number of random graphs
-
Luczak, T.: The chromatic number of random graphs. Combinatorica 11(1), 45-54 (1991)
-
(1991)
Combinatorica
, vol.11
, Issue.1
, pp. 45-54
-
-
Luczak, T.1
-
15
-
-
0001035413
-
On the method of bounded differences
-
In: Siemons, J. (ed.) Cambridge University Press, Cambridge
-
McDiarmid, C.J.H.: On the method of bounded differences. In: Siemons, J. (ed.) Surveys in Combinatorics: Invited Papers at the 12th British Combinatorial Conference. London Mathematical Society Lecture Notes Series, vol. 141, pp. 148-188. Cambridge University Press, Cambridge (1989)
-
(1989)
Surveys in Combinatorics: Invited Papers at the 12th British Combinatorial Conference. London Mathematical Society Lecture Notes Series
, vol.141
, pp. 148-188
-
-
McDiarmid, C.J.H.1
-
19
-
-
34548052480
-
The role mining problem: Finding a minimal descriptive set of roles
-
In: SACMAT 2007
-
Vaidya, J., Atluri, V., Guo, Q.: The role mining problem: finding a minimal descriptive set of roles. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, pp. 175-184 (2007)
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 175-184
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
-
20
-
-
57349117050
-
Migrating to optimal RBAC with minimal perturbation
-
In: SACMAT 2008
-
Vaidya, J., Atluri, V., Guo, Q., Adam, N.: Migrating to optimal RBAC with minimal perturbation. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, pp. 11-20 (2008)
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 11-20
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
Adam, N.4
-
21
-
-
34547237958
-
RoleMiner: Mining roles using subset enumeration
-
Vaidya, J., Atluri, V., Warner, J.: RoleMiner: mining roles using subset enumeration. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 144-153 (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 144-153
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
-
23
-
-
34548033731
-
Role engineering using graph optimisation
-
In: SACMAT 2007
-
Zhang, D., Ramamohanarao, K., Ebringer, T.: Role engineering using graph optimisation. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, pp. 139-144 (2007)
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 139-144
-
-
Zhang, D.1
Ramamohanarao, K.2
Ebringer, T.3
|