-
1
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security 2001; 4(3):224-274.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
2
-
-
0141972444
-
RBAC models-concepts and trends
-
Bertino E. RBAC models-concepts and trends. Computers & Security 2003; 22(6):511-514.
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 511-514
-
-
Bertino, E.1
-
3
-
-
0016949746
-
A lattice model of secure information flow
-
Denning DE. A lattice model of secure information flow. Communications of the ACM 1976; 19(5):236-243.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
4
-
-
50249183308
-
-
Role hierarchies and constraints for lattice based access controls. In Proceedings of European Symposium on Research in Computer Security.
-
Sandhu R. Role hierarchies and constraints for lattice based access controls. In Proceedings of European Symposium on Research in Computer Security. 1996; 65-79.
-
(1996)
, pp. 65-79
-
-
Sandhu, R.1
-
5
-
-
0031379040
-
-
nd ACM Workshop on Role based Access Control
-
nd ACM Workshop on Role based Access Control 1997; 31-40.
-
(1997)
, pp. 31-40
-
-
Osborn, S.1
-
7
-
-
84858011023
-
Fuzzy clustering based formal concept analysis for association rules mining
-
Aswani Kumar Ch. Fuzzy clustering based formal concept analysis for association rules mining. Applied artificial intelligence 2012; 26: 274-301.
-
(2012)
Applied artificial intelligence
, vol.26
, pp. 274-301
-
-
Aswani, K.C.1
-
8
-
-
80052354798
-
Formal concept analysis
-
Staab S, Studer R (Eds). Springer-Verlag: Berlin, Heidelberg
-
Stumme G. Formal concept analysis. In Handbook on Ontologies, Staab S, Studer R (Eds). Springer-Verlag: Berlin, Heidelberg, 2009; 177-200.
-
(2009)
Handbook on Ontologies
, pp. 177-200
-
-
Stumme, G.1
-
9
-
-
57849115713
-
Building access control models with attribute exploration
-
Obiedkov S, Kourie DG, Eloff JHP. Building access control models with attribute exploration. Computers & Security 2009; 28(1-2):2-7.
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 2-7
-
-
Obiedkov, S.1
Kourie, D.G.2
Eloff, J.H.P.3
-
10
-
-
76649139770
-
-
th International Conference on Conceptual Structures
-
th International Conference on Conceptual Structures 2009; 141-154.
-
(2009)
, pp. 141-154
-
-
Dau, F.1
Knechtel, M.2
-
11
-
-
84865291531
-
Modelling role hierarchy structure using the formal concept analysis
-
Sobieski S, Zielinski B. Modelling role hierarchy structure using the formal concept analysis. Annals UMCS Informatica 2010; 2:143-159.
-
(2010)
Annals UMCS Informatica
, vol.2
, pp. 143-159
-
-
Sobieski, S.1
Zielinski, B.2
-
12
-
-
84874341869
-
-
rd Edition, Pearson Education
-
rd Edition, Pearson Education 2003.
-
(2003)
-
-
Pfleeger, C.P.1
-
14
-
-
0000206310
-
Security models for web based applications
-
Joshi JBD, Aref WG, Ghafoor A, Spafford EH. Security models for web based applications. Communications of the ACM 2001; 44(2):38-44.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 38-44
-
-
Joshi, J.B.D.1
Aref, W.G.2
Ghafoor, A.3
Spafford, E.H.4
-
16
-
-
77953350247
-
Adding attributes to role-based access control
-
Kuhn DR, Coyne EJ, Weil TR. Adding attributes to role-based access control. Computer 2010; 43(6):79-81.
-
(2010)
Computer
, vol.43
, Issue.6
, pp. 79-81
-
-
Kuhn, D.R.1
Coyne, E.J.2
Weil, T.R.3
-
17
-
-
0030086382
-
Role based access control models
-
Sandhu R, Coyne E, Feinstein H, Youman C. Role based access control models. IEEE Computer 1996; 29(2):38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
21
-
-
78650536005
-
Mining associations in health care data using formal concept analysis and singular value decomposition
-
Kumar A, Ch, Srinivas S. Mining associations in health care data using formal concept analysis and singular value decomposition. Biological Systems 2010b; 18(4):787-807.
-
(2010)
Biological Systems
, vol.18
, Issue.4
, pp. 787-807
-
-
Kumar, C.A.1
Srinivas, S.2
-
22
-
-
0042049255
-
-
Exploration tools in formal concept analysis. In Opitz Editors. Ordinal and symbolic data analysis, Studies in classification, Data Analysis and Knowledge Organization, Springer-Verlag
-
Stumme G. Exploration tools in formal concept analysis. In Opitz et al. Editors. Ordinal and symbolic data analysis, Studies in classification, Data Analysis and Knowledge Organization, Springer-Verlag 1995; 31-44.
-
(1995)
, pp. 31-44
-
-
Stumme, G.1
-
23
-
-
77958604823
-
-
Triadic concept analysis of data with fuzzy attributes. In Proceedings of IEEE International conference on Granular computing
-
Belohlavek R, Osicka P. Triadic concept analysis of data with fuzzy attributes. In Proceedings of IEEE International conference on Granular computing 2010; 661-665.
-
(2010)
, pp. 661-665
-
-
Belohlavek, R.1
Osicka, P.2
-
25
-
-
57849096679
-
-
th International Conference on Database and Expert Systems Application
-
th International Conference on Database and Expert Systems Application 2008; 292-296.
-
(2008)
, pp. 292-296
-
-
Sarmah, A.1
Hazarika, S.M.2
Sinha, S.K.3
-
27
-
-
77953154360
-
Implementing role based access in healthcare ad hoc network
-
Memon QA. Implementing role based access in healthcare ad hoc network. Journal of Networks 2009; 4(3):192-199.
-
(2009)
Journal of Networks
, vol.4
, Issue.3
, pp. 192-199
-
-
Memon, Q.A.1
-
28
-
-
84874342792
-
-
Separation of duty in role based access control system: A case study. Master Thesis, School of Engineering, Blekinge Institute of Technology, Sweden
-
Kugblenu FM, Asim M. Separation of duty in role based access control system: A case study. Master Thesis, School of Engineering, Blekinge Institute of Technology, Sweden 2007.
-
(2007)
-
-
Kugblenu, F.M.1
Asim, M.2
-
29
-
-
67649300741
-
Formal concept analysis with background knowledge: Attribute priorities
-
Belohlavek R, Vychodil V. Formal concept analysis with background knowledge: Attribute priorities. IEEE Transactions on Systems, Man, and Cybernetics 2009; 39(4):399-409.
-
(2009)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.39
, Issue.4
, pp. 399-409
-
-
Belohlavek, R.1
Vychodil, V.2
-
30
-
-
84885202977
-
-
On concept lattices and implication bases from reduced contexts. In Proceedings of ICCS Supplement
-
Snasel V, Polovincak M, Dahwa HM, Horak Z. On concept lattices and implication bases from reduced contexts. In Proceedings of ICCS Supplement 2008; 83-90.
-
(2008)
, pp. 83-90
-
-
Snasel, V.1
Polovincak, M.2
Dahwa, H.M.3
Horak, Z.4
-
31
-
-
70449531469
-
Concept lattice reduction using fuzzy k means clustering
-
Kumar Ch A, Srinivas S. Concept lattice reduction using fuzzy k means clustering. Expert Systems with Applications 2010; 37:2696-2704.
-
(2010)
Expert Systems with Applications
, vol.37
, pp. 2696-2704
-
-
Kumar, C.A.1
Srinivas, S.2
-
32
-
-
84555203726
-
Knowledge discovery in data using formal concept analysis and random projections
-
Kumar Ch A. Knowledge discovery in data using formal concept analysis and random projections. International Journal of Applied Mathematics and Computer Science 2011; 21(4):745-756.
-
(2011)
International Journal of Applied Mathematics and Computer Science
, vol.21
, Issue.4
, pp. 745-756
-
-
Kumar, C.A.1
-
34
-
-
84858228868
-
A method for reduction of fuzzy relation in fuzzy formal context
-
Communications in Computer and Information Science, Springer: Berlin, Heidelberg
-
Singh PK, Kumar Ch A. A method for reduction of fuzzy relation in fuzzy formal context. In Proceedings of International conference on mathematical modeling and scientific computation, Vol. 283. Communications in Computer and Information Science, Springer: Berlin, Heidelberg, 2012; 343-350.
-
(2012)
Proceedings of International conference on mathematical modeling and scientific computation
, vol.283
, pp. 343-350
-
-
Singh, P.K.1
Kumar, C.A.2
|