-
1
-
-
0030086382
-
Role Based Access Control Models
-
Sandhu, R., Coyne, E.J., Feinstein, H., Youman, C.: Role Based Access Control Models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.3
Youman, C.4
-
2
-
-
76649139770
-
Access Policy Design Supported by FCA Methods
-
Rudolph, S., Dau, F., Kuznetsov, S.O. (eds.) ICCS 2009. Springer, Heidelberg
-
Dau, F., Knechtel, M.: Access Policy Design Supported by FCA Methods. In: Rudolph, S., Dau, F., Kuznetsov, S.O. (eds.) ICCS 2009. LNCS, vol. 5662, pp. 141-154. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5662
, pp. 141-154
-
-
Dau, F.1
Knechtel, M.2
-
3
-
-
0141972444
-
RBAC Models-Concept and Trends
-
Bertino, E.: RBAC Models-Concept and Trends. Computers & Security 22(6), 511-514 (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 511-514
-
-
Bertino, E.1
-
5
-
-
84865291531
-
Modelling Role Hierarchy Structure using the Formal Concept Analysis
-
Sobieski, S., Zielinski, B.: Modelling Role Hierarchy Structure using The Formal Concept Analysis. Annals UMCS Informatica 2, 143-159 (2010)
-
(2010)
Annals UMCS Informatica
, vol.2
, pp. 143-159
-
-
Sobieski, S.1
Zielinski, B.2
-
6
-
-
77953350247
-
Adding Attributes to Role Based Access Control
-
Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding Attributes to Role Based Access Control. IEEE Computer 43(6), 79-81 (2010)
-
(2010)
IEEE Computer
, vol.43
, Issue.6
, pp. 79-81
-
-
Kuhn, D.R.1
Coyne, E.J.2
Weil, T.R.3
-
7
-
-
82755162050
-
Mining Constraints in Role Based Access Control
-
Ma, X., Li, R., Lu, Z., Wang, W.: Mining Constraints in Role Based Access Control. Mathematical and Computer Modeling 55, 87-96 (2012)
-
(2012)
Mathematical and Computer Modeling
, vol.55
, pp. 87-96
-
-
Ma, X.1
Li, R.2
Lu, Z.3
Wang, W.4
-
9
-
-
80052354798
-
Formal Concept Analysis
-
Springer
-
Stumme, G.: Formal Concept Analysis. In: Handbook of Ontologies, pp. 177-199. Springer (2009)
-
(2009)
Handbook of Ontologies
, pp. 177-199
-
-
Stumme, G.1
-
10
-
-
78650536005
-
Mining Associations in Health Care Data using Formal Concept Analysis and Singular Value Decomposition
-
Aswani Kumar, C., Srinivas, S.: Mining Associations in Health Care Data using Formal Concept Analysis and Singular Value Decomposition. Journal of Biological Systems 18(4), 787-807 (2010)
-
(2010)
Journal of Biological Systems
, vol.18
, Issue.4
, pp. 787-807
-
-
Aswani Kumar, C.1
Srinivas, S.2
-
11
-
-
70449531469
-
Concept Lattice Reduction using Fuzzy k Means Clustering
-
Aswani Kumar, C., Srinivas, S.: Concept Lattice Reduction using Fuzzy k Means Clustering. Expert Systems with Applications 37(3), 2696-2704 (2010)
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.3
, pp. 2696-2704
-
-
Aswani Kumar, C.1
Srinivas, S.2
-
12
-
-
83355163305
-
Mining Association Rules Using Non-Negative Matrix Factorization and Formal Concept Analysis
-
Venugopal, K.R., Patnaik, L.M. (eds.) ICIP 2011. Springer, Heidelberg
-
Aswani Kumar, C.: Mining Association Rules Using Non-Negative Matrix Factorization and Formal Concept Analysis. In: Venugopal, K.R., Patnaik, L.M. (eds.) ICIP 2011. CCIS, vol. 157, pp. 31-39. Springer, Heidelberg (2011)
-
(2011)
CCIS
, vol.157
, pp. 31-39
-
-
Aswani Kumar, C.1
-
14
-
-
84885202977
-
On Concept Lattices and Implication Bases from Reduced Contexts
-
Snasel, V., Polovincak, M., Dahwa, H.M., Horak, Z.: On Concept Lattices and Implication Bases from Reduced Contexts. In: Proc. of ICCS Supplement, pp. 83-90 (2008)
-
(2008)
Proc. of ICCS Supplement
, pp. 83-90
-
-
Snasel, V.1
Polovincak, M.2
Dahwa, H.M.3
Horak, Z.4
-
15
-
-
84858011023
-
Fuzzy Clustering Based Formal Concept Analysis for Association Rules Mining
-
Aswani Kumar, C.: Fuzzy Clustering Based Formal Concept Analysis for Association Rules Mining. Applied Artificial Intelligence 26(3), 274-301 (2012)
-
(2012)
Applied Artificial Intelligence
, vol.26
, Issue.3
, pp. 274-301
-
-
Aswani Kumar, C.1
-
16
-
-
79961187331
-
Unix Systems Monitoring with FCA
-
Andrews, S., Polovina, S., Hill, R., Akhgar, B. (eds.) ICCS 2011. Springer, Heidelberg
-
Priss, U.: Unix Systems Monitoring with FCA. In: Andrews, S., Polovina, S., Hill, R., Akhgar, B. (eds.) ICCS 2011. LNCS (LNAI), vol. 6828, pp. 243-256. Springer, Heidelberg (2011)
-
(2011)
LNCS (LNAI)
, vol.6828
, pp. 243-256
-
-
Priss, U.1
-
17
-
-
57849115713
-
Building Access Control Models with Attribute Exploration
-
Obiedkov, S., Derrick, G.K., Eloff, J.H.P.: Building Access Control Models with Attribute Exploration. Computers & Security 28(1-2), 2-7 (2009)
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 2-7
-
-
Obiedkov, S.1
Derrick, G.K.2
Eloff, J.H.P.3
-
19
-
-
77953154360
-
Implementing Role Based Access in Healthcare Ad Hoc Network
-
Memon, Q.A.: Implementing Role Based Access in Healthcare Ad Hoc Network. Journal of Networks 4(3), 192-199 (2009)
-
(2009)
Journal of Networks
, vol.4
, Issue.3
, pp. 192-199
-
-
Memon, Q.A.1
-
20
-
-
84858228868
-
A Method for Reduction of Fuzzy Relation in Fuzzy Formal Context
-
Balasubramaniam, P., Uthayakumar, R. (eds.) ICMMSC 2012. Springer, Heidelberg
-
Singh, P.K., Aswani Kumar, C.: A Method for Reduction of Fuzzy Relation in Fuzzy Formal Context. In: Balasubramaniam, P., Uthayakumar, R. (eds.) ICMMSC 2012. CCIS, vol. 283, pp. 343-350. Springer, Heidelberg (2012)
-
(2012)
CCIS
, vol.283
, pp. 343-350
-
-
Singh, P.K.1
Aswani Kumar, C.2
|