메뉴 건너뛰기




Volumn 14, Issue 1, 2011, Pages

Detecting and resolving policy misconfigurations in access-control systems

Author keywords

Access control; Machine learning; Policy inference

Indexed keywords

ASSOCIATION RULE MINING; MACHINE-LEARNING; MISCONFIGURATIONS; PRIMARY CONTRIBUTION;

EID: 79959832940     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1952982.1952984     Document Type: Conference Paper
Times cited : (65)

References (29)
  • 14
    • 84968352943 scopus 로고    scopus 로고
    • Policy management using access control spaces
    • JAEGER, T., EDWARDS, A., AND ZHANG, X. 2003. Policy management using access control spaces. ACM Trans. Inform. Syst. Sec. 6, 3, 327-364.
    • (2003) ACM Trans. Inform. Syst. Sec , vol.6 , Issue.3 , pp. 327-364
    • Jaeger, T.1    Edwards, A.2    Zhang, X.3
  • 19
    • 62349090353 scopus 로고    scopus 로고
    • Rt: A role-based trust-management framework. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition. MAYER, A., WOOL, A., AND ZISKIND, E. 2000. Fang: A firewall analysis engine
    • LI, N. AND MITCHELL, J. C. 2003. Rt: A role-based trust-management framework. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition. MAYER, A., WOOL, A., AND ZISKIND, E. 2000. Fang: A firewall analysis engine. In Proceedings of the IEEE Symposium on Security and Privacy.
    • (2003) Proceedings of the IEEE Symposium on Security and Privacy
    • Li, N.1    Mitchell, J.C.2
  • 22
    • 0003614529 scopus 로고    scopus 로고
    • SDSI-A simple distributed security infrastructure
    • Presented at the, Rump session
    • RIVEST, R. L. AND LAMPSON, B. 1996. SDSI-A simple distributed security infrastructure. Presented at the International Cryptology Conference. Rump session.
    • (1996) International Cryptology Conference
    • Rivest, R.L.1    Lampson, B.2
  • 29


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.