-
1
-
-
30644462262
-
-
American National Standards Institute (ANSI) and InterNational Committee for Information Technology Standards (INCITS): ANSI/INCITS 359-2004
-
American National Standards Institute (ANSI) and InterNational Committee for Information Technology Standards (INCITS): ANSI/INCITS 359-2004, Information Technology-Role Based Access Control (2004)
-
(2004)
Information Technology-Role Based Access Control
-
-
-
2
-
-
48249141905
-
A cost-driven approach to role engineering
-
In: SAC 2008, Fortaleza, Ceará, Brazil
-
Colantonio, A., Di Pietro, R., Ocello, A.: A cost-driven approach to role engineering. In: Proceedings of the 23rd ACM Symposium on Applied Computing, SAC 2008, Fortaleza, Ceará, Brazil, vol. 3, pp. 2129-2136 (2008)
-
(2008)
Proceedings of the 23rd ACM Symposium on Applied Computing
, vol.3
, pp. 2129-2136
-
-
Colantonio, A.1
Di Pietro, R.2
Ocello, A.3
-
3
-
-
48249156932
-
Leveraging lattices to improve role mining
-
In: SEC 2008. IFIP International Federation for Information Processing,. Springer, Heidelberg
-
Colantonio, A., Di Pietro, R., Ocello, A.: Leveraging lattices to improve role mining. In: Proceedings of the IFIP TC 11 23rd International Information Security Conference, SEC 2008. IFIP International Federation for Information Processing, vol. 278, pp. 333-347. Springer, Heidelberg (2008)
-
(2008)
Proceedings of the IFIP TC 11 23rd International Information Security Conference
, vol.278
, pp. 333-347
-
-
Colantonio, A.1
Di Pietro, R.2
Ocello, A.3
-
4
-
-
84885024683
-
-
Tech. rep., Università degli Studi di Rome Tre
-
Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: Mining stable roles in RBAC, TR 01-01-09. Tech. rep., Università degli Studi di Rome Tre (2009), http://www.dsi.uniroma1.it/-dipietro/TR01-01-09.pdf
-
(2009)
Mining stable roles in RBAC, TR 01-01-09
-
-
Colantonio, A.1
Di Pietro, R.2
Ocello, A.3
Verde, N.V.4
-
6
-
-
57349100404
-
Fast exact and heuristic methods for role minimization problems
-
In: SACMAT 2008
-
Ene, A., Horne, W., Milosavljevic, N., Rao, P., Schreiber, R., Tarjan, R.E.: Fast exact and heuristic methods for role minimization problems. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, pp. 1-10 (2008)
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 1-10
-
-
Ene, A.1
Horne, W.2
Milosavljevic, N.3
Rao, P.4
Schreiber, R.5
Tarjan, R.E.6
-
7
-
-
35048813595
-
Tiling databases
-
In: Suzuki, E., Arikawa, S. (eds.) Springer, Heidelberg
-
Geerts, F., Goethals, B., Mielikäinen, T.: Tiling databases. In: Suzuki, E., Arikawa, S. (eds.) DS 2004. LNCS, vol. 3245, pp. 278-289. Springer, Heidelberg (2004)
-
(2004)
DS 2004. LNCS
, vol.3245
, pp. 278-289
-
-
Geerts, F.1
Goethals, B.2
Mielikäinen, T.3
-
8
-
-
0348000562
-
Fast distributed algorithms for brooks-vizing colorings
-
Grable, D.A., Panconesi, A.: Fast distributed algorithms for brooks-vizing colorings. J. Algorithms 37(1), 85-120 (2000)
-
(2000)
J. Algorithms
, vol.37
, Issue.1
, pp. 85-120
-
-
Grable, D.A.1
Panconesi, A.2
-
11
-
-
0242625194
-
Role mining-revealing business roles for security administration using data mining technology
-
In: SACMAT 2003, Como, Italy
-
Kuhlmann, M., Shohat, D., Schimpf, G.: Role mining-revealing business roles for security administration using data mining technology. In: Proceedings of the 8th ACMSymposium on Access Control Models and Technologies, SACMAT 2003, Como, Italy, pp. 179-186 (2003)
-
(2003)
Proceedings of the 8th ACMSymposium on Access Control Models and Technologies
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
12
-
-
48349103211
-
Optimal boolean matrix decomposition: Application to role engineering
-
In: ICDE 2008
-
Lu, H., Vaidya, J., Atluri, V.: Optimal boolean matrix decomposition: Application to role engineering. In: Proceedings of the 24th IEEE International Conferene on Data Engineering, ICDE 2008, pp. 297-306 (2008)
-
(2008)
Proceedings of the 24th IEEE International Conferene on Data Engineering
, pp. 297-306
-
-
Lu, H.1
Vaidya, J.2
Atluri, V.3
-
16
-
-
34548052480
-
The role mining problem: Finding a minimal descriptive set of roles
-
In: SACMAT 2007
-
Vaidya, J., Atluri, V., Guo, Q.: The role mining problem: finding a minimal descriptive set of roles. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, pp. 175-184 (2007)
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 175-184
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
-
17
-
-
57349117050
-
Migrating to optimal RBAC with minimal perturbation
-
In: SACMAT 2008
-
Vaidya, J., Atluri, V., Guo, Q., Adam, N.: Migrating to optimal RBAC with minimal perturbation. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, pp. 11-20 (2008)
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 11-20
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
Adam, N.4
-
18
-
-
34547237958
-
RoleMiner: Mining roles using subset enumeration
-
Vaidya, J., Atluri, V., Warner, J.: RoleMiner: mining roles using subset enumeration. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 144-153 (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 144-153
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
-
19
-
-
34548033731
-
Role engineering using graph optimisation
-
In: SACMAT 2007
-
Zhang, D., Ramamohanarao, K., Ebringer, T.: Role engineering using graph optimisation. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, pp. 139-144 (2007)
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 139-144
-
-
Zhang, D.1
Ramamohanarao, K.2
Ebringer, T.3
|