-
1
-
-
84953355673
-
Mining association rules with weighted items
-
C. H. Cai, W. C. Fu, C. H. Cheng, and W. W. Kwong. Mining association rules with weighted items. In Proceedings of the 1998 International Symposium on Database Engineering and Applications, pages 68-77, 1998.
-
(1998)
Proceedings of the 1998 International Symposium on Database Engineering and Applications
, pp. 68-77
-
-
Cai, C.H.1
Fu, W.C.2
Cheng, C.H.3
Kwong, W.W.4
-
3
-
-
57349100404
-
Fast exact and heuristic methods for role minimization problems
-
June
-
A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber, and R. E. Tarjan. Fast exact and heuristic methods for role minimization problems. In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pages 1-10, June 2008.
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 1-10
-
-
Ene, A.1
Horne, W.2
Milosavljevic, N.3
Rao, P.4
Schreiber, R.5
Tarjan, R.E.6
-
5
-
-
84992227458
-
Proposed nist standard for role-based access control
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Transactions on Information and System Security, 4(3):224-274, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
6
-
-
74049139498
-
A probabilistic approach to hybrid role mining
-
November
-
M. Frank, A. P. Streich, D. Basin, and J. M. Buhmann. A probabilistic approach to hybrid role mining. In Proceedings of the 16th ACM Conference on Computer and Communications Security, pages 101-111, November 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 101-111
-
-
Frank, M.1
Streich, A.P.2
Basin, D.3
Buhmann, J.M.4
-
9
-
-
0242709337
-
Observations on the role life-cycle in the context of enterprise security management
-
June
-
A. Kern, M. Kuhlmann, A. Schaad, and J. Moffett. Observations on the role life-cycle in the context of enterprise security management. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pages 43-51, June 2002.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies
, pp. 43-51
-
-
Kern, A.1
Kuhlmann, M.2
Schaad, A.3
Moffett, J.4
-
11
-
-
57349105655
-
Mining roles with semantic meanings
-
June
-
I. Molloy, H. Chen, T. Li, Q. Wang, N. Li, E. Bertino, S. Calo, and J. Lobo. Mining roles with semantic meanings. In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pages 21-30, June 2008.
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 21-30
-
-
Molloy, I.1
Chen, H.2
Li, T.3
Wang, Q.4
Li, N.5
Bertino, E.6
Calo, S.7
Lobo, J.8
-
12
-
-
70450248454
-
Evaluating role mining algorithms
-
June
-
I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang, and J. Lobo. Evaluating role mining algorithms. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pages 95-104, June 2009.
-
(2009)
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies
, pp. 95-104
-
-
Molloy, I.1
Li, N.2
Li, T.3
Mao, Z.4
Wang, Q.5
Lobo, J.6
-
14
-
-
0030086382
-
Role-based access control models
-
February
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
19
-
-
57349117050
-
Migrating to optimal RBAC with minimal perturbation
-
June
-
J. Vaidya, V. Atluri, Q. Guo, and N. Adam. Migrating to optimal RBAC with minimal perturbation. In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pages 11-20, June 2008.
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 11-20
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
Adam, N.4
-
21
-
-
67049169354
-
Specvat: Enhanced visual cluster analysis
-
December
-
L. Wang, X. Geng, J. C. Bezdek, C. Leckie, and K. Ramamohanarao. Specvat: enhanced visual cluster analysis. In Proceedings of the 8th IEEE International Conference on Data Mining, pages 638-647, December 2008.
-
(2008)
Proceedings of the 8th IEEE International Conference on Data Mining
, pp. 638-647
-
-
Wang, L.1
Geng, X.2
Bezdek, J.C.3
Leckie, C.4
Ramamohanarao, K.5
-
25
-
-
60649116448
-
Permission set mining: Discovering practical and useful roles
-
December
-
D. Zhang, K. Ramamohanarao, T. Ebringer, and T. Yann. Permission set mining: discovering practical and useful roles. In Proceedings of the 2008 Annual Computer Security Applications Conference, pages 247-256, December 2008.
-
(2008)
Proceedings of the 2008 Annual Computer Security Applications Conference
, pp. 247-256
-
-
Zhang, D.1
Ramamohanarao, K.2
Ebringer, T.3
Yann, T.4
|