-
1
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E. Role-based access control models. IEEE Computer 1996, 29(2):38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
2
-
-
60649116448
-
Permission set mining: discovering practical and useful roles, in:
-
Proc. 24th, USA
-
D. Zhang, K. Ramamohanarao, T. Ebringer, T. Yann, Permission set mining: discovering practical and useful roles, in: Proc. 24th International Conference on Annual Computer Security Applications, Califonia, USA, 2008, pp. 247-256.
-
(2008)
International Conference on Annual Computer Security Applications, Califonia
-
-
Zhang, D.1
Ramamohanarao, K.2
Ebringer, T.3
Yann, T.4
-
3
-
-
4243280162
-
The economic impact of role-based access control, Planning report 02-1, National Institute of Standards and Technology
-
March
-
M.P. Gallagher, A. O'Connor, B. Kropp, The economic impact of role-based access control, Planning report 02-1, National Institute of Standards and Technology, March 2002.
-
(2002)
-
-
Gallagher, M.P.1
O'Connor, A.2
Kropp, B.3
-
4
-
-
0035790675
-
The role-based access control system of a European bank
-
a case study and discussion, in: Proc. 6th ACM Symposium on Access Control Models and Technologies, Chantilly, Virginia, USA
-
A. Schaad, J. Moffett, J. Jacob, The role-based access control system of a European bank: a case study and discussion, in: Proc. 6th ACM Symposium on Access Control Models and Technologies, Chantilly, Virginia, USA, 2001, pp. 3-9.
-
(2001)
, pp. 3-9
-
-
Schaad, A.1
Moffett, J.2
Jacob, J.3
-
5
-
-
77954927281
-
Role mining based on weights, in
-
Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA
-
X. Ma, R. Li, Z. Lu, Role mining based on weights, in: Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA, 2010, pp. 65-74.
-
(2010)
-
-
Ma, X.1
Li, R.2
Lu, Z.3
-
6
-
-
82755168554
-
-
Role engineering, in: Proc. 1th ACM Workshop on Role-Based Access Control
-
E.J. Coyne, Role engineering, in: Proc. 1th ACM Workshop on Role-Based Access Control, 1995.
-
(1995)
-
-
Coyne, E.J.1
-
7
-
-
34547237958
-
Roleminer: mining roles using subset enumeration, in:
-
Proc. 13th ACM Conference on Computer and Communications Security, Alexandria, USA,
-
J. Vaidya, V. Atluri, J. Warner, Roleminer: mining roles using subset enumeration, in: Proc. 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006, pp. 144-153.
-
(2006)
, pp. 144-153
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
-
8
-
-
77954932478
-
On the definition of role mining, in
-
Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA
-
M. Frank, J.M. Buhmann, D. Basin, On the definition of role mining, in: Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA, 2010, pp. 35-44.
-
(2010)
, pp. 35-44
-
-
Frank, M.1
Buhmann, J.M.2
Basin, D.3
-
9
-
-
30644478631
-
Role mining with ORCA, in:
-
Proc. 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden
-
J. Schlegelmilch, U. Steffens, Role mining with ORCA, in: Proc. 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, 2005, pp. 168-176.
-
(2005)
, pp. 168-176
-
-
Schlegelmilch, J.1
Steffens, U.2
-
10
-
-
34547237958
-
Roleminer: mining roles using subset enumeration, in:
-
Proc. 13th ACM Conference on Computer and Communications Security, Alexandria, USA,
-
J. Vaidya, V. Atluri, J. Warner, Roleminer: mining roles using subset enumeration, in: Proc. 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006, pp. 144-153.
-
(2006)
, pp. 144-153
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
-
11
-
-
57349105655
-
-
Mining roles with semantic meanings, in: Proc. 13th ACM Symposium on Access Control Models and Technologies, Colorado, USA
-
I. Molloy, H. Chen, T. Li, Q. Wang, N. Li, E. Bertino, S. Calo, J. Lobo, Mining roles with semantic meanings, in: Proc. 13th ACM Symposium on Access Control Models and Technologies, Colorado, USA, 2008, pp. 21-30.
-
(2008)
, pp. 21-30
-
-
Molloy, I.1
Chen, H.2
Li, T.3
Wang, Q.4
Li, N.5
Bertino, E.6
Calo, S.7
Lobo, J.8
-
12
-
-
34548033731
-
Role engineering using graph optimisation
-
in: Proc. 12th ACM Symposium on Access Control Models and Technologies, Antipolis, France
-
D. Zhang, K. Ramamohanarao, T. Ebringer, Role engineering using graph optimisation, in: Proc. 12th ACM Symposium on Access Control Models and Technologies, Antipolis, France, 2007, pp. 139-144.
-
(2007)
, pp. 139-144
-
-
Zhang, D.1
Ramamohanarao, K.2
Ebringer, T.3
-
13
-
-
57349100404
-
Fast exact and heuristic methods for role minimization problems, in:
-
Proc. 13th ACM Symposium on Access Control Models and Technologies, Colorado, USA,
-
A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber, R.E. Tarjan, Fast exact and heuristic methods for role minimization problems, in: Proc. 13th ACM Symposium on Access Control Models and Technologies, Colorado, USA, 2008, pp. 1-10.
-
(2008)
, pp. 1-10
-
-
Ene, A.1
Horne, W.2
Milosavljevic, N.3
Rao, P.4
Schreiber, R.5
Tarjan, R.E.6
-
14
-
-
74049139498
-
-
probabilistic approach to hybrid role mining, in: Proc. 16th ACM Conference on Computer and Communications Security, IL, USA
-
M. Frank, A.P. Streich, D. Basin, J.M. Buhmann, A probabilistic approach to hybrid role mining, in: Proc. 16th ACM Conference on Computer and Communications Security, IL, USA, 2009, pp. 101-111.
-
(2009)
, pp. 101-111
-
-
Frank, M.1
Streich, A.P.2
Basin, D.3
Buhmann, J.4
-
15
-
-
77954936501
-
-
StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy, in: Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA, 2010
-
H. Takabi, J.B.D. Joshi, StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy, in: Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA, 2010, pp. 55-64.
-
(2010)
, pp. 55-64
-
-
Takabi, H.1
Joshi, J.B.D.2
-
16
-
-
57349117050
-
Migrating to optimal RBAC with minimal perturbation, in
-
Proc. 13th ACM Symposium on Access Control Models and Technologies, Colorado, USA
-
J. Vaidya, V. Atluri, Q. Guo, N. Adam, Migrating to optimal RBAC with minimal perturbation, in: Proc. 13th ACM Symposium on Access Control Models and Technologies, Colorado, USA, 2008, pp. 11-20.
-
(2008)
, pp. 11-20
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
Adam, N.4
-
17
-
-
48349103211
-
-
Optimal boolean matrix decomposition: application to role engineering, in: Proc. 24th International Conference on Data Engineering, Cancun, Mexico
-
H. Lu, J. Vaidya, V. Atluri, Optimal boolean matrix decomposition: application to role engineering, in: Proc. 24th International Conference on Data Engineering, Cancun, Mexico, 2008, pp. 297-306.
-
(2008)
, pp. 297-306
-
-
Lu, H.1
Vaidya, J.2
Atluri, V.3
-
18
-
-
35048813595
-
-
Tiling databases, in: Proc. 7th International Conference Discovery Science, Padova, Italy
-
F. Geerts, B. Goethals, T. Mielikainen, Tiling databases, in: Proc. 7th International Conference Discovery Science, Padova, Italy, 2004, pp. 278-289.
-
(2004)
, pp. 278-289
-
-
Geerts, F.1
Goethals, B.2
Mielikainen, T.3
-
19
-
-
77954945655
-
Mining roles with noisy data, in:
-
Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA
-
I. Molloy, N. Li, J. Lobo, L. Dickens, Mining roles with noisy data, in: Proc. 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, PA, USA, 2010, pp. 45-54.
-
(2010)
, pp. 45-54
-
-
Molloy, I.1
Li, N.2
Lobo, J.3
Dickens, L.4
-
20
-
-
70450248454
-
2009
-
Evaluating role mining algorithm, in: Proc. 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy
-
I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang, J. Lobo, Evaluating role mining algorithm, in: Proc. 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, 2009, pp. 95-104.
-
-
-
Molloy, I.1
Li, N.2
Li, T.3
Mao, Z.4
Wang, Q.5
Lobo, J.6
|