-
2
-
-
4243280162
-
The economic impact of role-based access control
-
M. P. Gallagher, A.C. O'Connor, and B. Kropp, "The economic impact of role-based access control", Planning report 02-1, National Institute of Standards and Technology, 2002.
-
(2002)
Planning Report 02-1, National Institute of Standards and Technology
-
-
Gallagher, M.P.1
O'Connor, A.C.2
Kropp, B.3
-
4
-
-
0242625196
-
On modeling system-centric information for role engineering
-
D. Shin, G.-J. Ahn, S. Cho, and S. Jin, "On modeling system-centric information for role engineering", In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), pages 169-178, 2003.
-
(2003)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 169-178
-
-
Shin, D.1
Ahn, G.-J.2
Cho, S.3
Jin, S.4
-
6
-
-
0242709337
-
Observations on the role life-cycle in the context of enterprise security management
-
A. Kern, M. Kuhlmann, A. Schaad, and J. Moffett, "Observations on the role life-cycle in the context of enterprise security management", In Proc. 7th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 43-51, 2002.
-
(2002)
Proc. 7th ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 43-51
-
-
Kern, A.1
Kuhlmann, M.2
Schaad, A.3
Moffett, J.4
-
7
-
-
0242625194
-
Role mining-revealing business roles for security administration using data mining technology
-
M. Kuhlmann, D. Shohat, and G. Schimpf, "Role mining-revealing business roles for security administration using data mining technology", In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), pages 179-186, 2003.
-
(2003)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
9
-
-
34548052480
-
The role mining problem: Finding a minimal descriptive set of roles
-
J. Vaidya, V. Atluri, and Q. Guo, "The role mining problem: Finding a minimal descriptive set of roles", In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), pages 175-184, 2007.
-
(2007)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 175-184
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
-
10
-
-
34547237958
-
Roleminer: Mining roles using subset enumeration
-
J. Vaidya, V. Atluri, and J. Warner, "Roleminer: Mining roles using subset enumeration", In Proc. ACM Conference on Computer and Communications Security (CCS), pages 144-153, 2006.
-
(2006)
Proc. ACM Conference on Computer and Communications Security (CCS)
, pp. 144-153
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
-
11
-
-
34548033731
-
Role engineering using graph optimisation
-
D. Zhang, K. Ramamohanarao, and T. Ebringer, "Role engineering using graph optimisation", In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), pages 139-144, 2007.
-
(2007)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 139-144
-
-
Zhang, D.1
Ramamohanarao, K.2
Ebringer, T.3
-
12
-
-
48249141905
-
A cost-driven approach to role engineering
-
A. Colantonio, R. Di Pietro, and A. Ocello, "A Cost-Driven Approach to Role Engineering", In Proc. 2008 ACM symposium on Applied computing (SAC'08), pages 2129-2136, 2008.
-
(2008)
Proc. 2008 ACM Symposium on Applied Computing (SAC'08)
, pp. 2129-2136
-
-
Colantonio, A.1
Di Pietro, R.2
Ocello, A.3
-
13
-
-
48349103211
-
Optimal Boolean matrix decomposition: Application to role engineering
-
H. Lu, J. Vaidya, and V. Atluri, "Optimal Boolean Matrix Decomposition: Application to Role Engineering", In Proc. IEEE 24th International Conference on Data Engineering (ICDE2008), pages 297-306, 2008.
-
(2008)
Proc. IEEE 24th International Conference on Data Engineering (ICDE2008)
, pp. 297-306
-
-
Lu, H.1
Vaidya, J.2
Atluri, V.3
-
14
-
-
60649115442
-
The role hierachry mining problem: Discovery of optimal role hierarchies
-
Q. Guo, J. Vaidya, and V. Atluri, "The Role Hierachry Mining Problem: Discovery of Optimal Role Hierarchies", In Proc. 2008 Annual Computer Security Applications Conference, pages 237-246, 2008.
-
(2008)
Proc. 2008 Annual Computer Security Applications Conference
, pp. 237-246
-
-
Guo, Q.1
Vaidya, J.2
Atluri, V.3
-
15
-
-
57349100404
-
Fast exact and heuristic methods for role minimization problems
-
A. Ene, W. Horne, N. Milosavljevic, "Fast Exact and Heuristic Methods for Role Minimization Problems", In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), pages 1-10, 2008.
-
(2008)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 1-10
-
-
Ene, A.1
Horne, W.2
Milosavljevic, N.3
-
16
-
-
57349117050
-
Migrating to optimal RBAC with minimal perturbation
-
J. Vaidya, V. Atluri, and Q. Guo, "Migrating to Optimal RBAC with Minimal Perturbation", In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), pages 11-20, 2008.
-
(2008)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 11-20
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
-
17
-
-
57349105655
-
Mining roles with semantic meanings
-
I. Molloy, H. Chen, T. Li, Q. Wang, N. Li, E. Bertino, S. Calo, and J. Lobo, "Mining Roles with Semantic Meanings", In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), pages 21-30, 2008.
-
(2008)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 21-30
-
-
Molloy, I.1
Chen, H.2
Li, T.3
Wang, Q.4
Li, N.5
Bertino, E.6
Calo, S.7
Lobo, J.8
-
18
-
-
70450248454
-
Evaluating role mining algorithms
-
I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang, and J. Lobo, "Evaluating Role Mining Algorithms", In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), pages 95-104, 2009.
-
(2009)
Proc. ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 95-104
-
-
Molloy, I.1
Li, N.2
Li, T.3
Mao, Z.4
Wang, Q.5
Lobo, J.6
-
19
-
-
70049099334
-
A class of probabilistic models for role engineering
-
M. Frank, D. Basin, J. M. Buhmann, "A Class of Probabilistic Models for Role Engineering", In Proc. 15th ACM conference on Computer and Communications Security (CCS), pages 299-310, 2008.
-
(2008)
Proc. 15th ACM Conference on Computer and Communications Security (CCS)
, pp. 299-310
-
-
Frank, M.1
Basin, D.2
Buhmann, J.M.3
-
20
-
-
74049139498
-
A probabilistic approach to hybrid role mining
-
M. Frank, A. P. Streich, D. Basin, and J. M. Buhmann, "A Probabilistic Approach to Hybrid Role Mining", In Proc. 16th ACM conference on Computer and Communications Security (CCS), pages 101-111, 2009.
-
(2009)
Proc. 16th ACM Conference on Computer and Communications Security (CCS)
, pp. 101-111
-
-
Frank, M.1
Streich, A.P.2
Basin, D.3
Buhmann, J.M.4
-
25
-
-
77954910499
-
-
http://www.st.cs.uni-saarland.de/lindig.
-
-
-
|