共 50 条
- [2] Policy Extraction and Optimization with Access Logs for Attribute-based Access Control [J]. Journal of Network Intelligence, 2023, 8 (03): : 932 - 947
- [3] Mining Attribute-Based Access Control Policies from Logs [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
- [4] Attribute Expressions, Policy Tables and Attribute-Based Access Control [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
- [6] On the Feasibility of Attribute-Based Access Control Policy Mining [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
- [8] Attribute-based lightweight reconfigurable access control policy [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (02): : 112 - 122
- [10] Attribute-Based Access Control Policy Review in Permissioned Blockchain [J]. SECURE KNOWLEDGE MANAGEMENT IN THE ARTIFICIAL INTELLIGENCE ERA, 2022, 1549 : 97 - 109