메뉴 건너뛰기




Volumn , Issue , 2013, Pages 37-47

Evolving role definitions through permission invocation patterns

Author keywords

Audit logs; Role mining; Role based access control

Indexed keywords

ACADEMIC MEDICAL CENTERS; AUDIT LOGS; DATA MINING METHODS; ELECTRONIC MEDICAL RECORD SYSTEM; OBJECTIVE FUNCTIONS; ROLE MININGS; ROLE-BASED ACCESS CONTROL; SIMILARITY MEASURE;

EID: 84883063291     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2462410.2462422     Document Type: Conference Paper
Times cited : (25)

References (26)
  • 3
    • 0000301097 scopus 로고
    • A greedy heuristic for the set-covering problem
    • V. Chvatal. A greedy heuristic for the set-covering problem. Mathematics of Operations Research, 4:233-235, 1979.
    • (1979) Mathematics of Operations Research , vol.4 , pp. 233-235
    • Chvatal, V.1
  • 4
    • 79151485910 scopus 로고    scopus 로고
    • A new role mining framework to elicit business roles and to mitigate enterprise risk
    • A. Colantonio, R. D. Pietro, A. Ocello, and N. V. Verde. A new role mining framework to elicit business roles and to mitigate enterprise risk. Decision Support Systems, 50:715-731, 2011.
    • (2011) Decision Support Systems , vol.50 , pp. 715-731
    • Colantonio, A.1    Pietro, R.D.2    Ocello, A.3    Verde, N.V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.