共 50 条
- [2] Mining Attribute-Based Access Control Policies from RBAC Policies [J]. 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
- [3] Mining Attribute-Based Access Control Policies from Logs [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
- [4] VisMAP: Visual Mining of Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 79 - 98
- [5] Deconflicting policies in attribute-based access control systems [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
- [6] Evolutionary Inference of Attribute-Based Access Control Policies [J]. EVOLUTIONARY MULTI-CRITERION OPTIMIZATION, PT I, 2015, 9018 : 351 - 365
- [7] A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 489 - 506
- [8] On the Feasibility of Attribute-Based Access Control Policy Mining [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
- [9] Specification and Analysis of Attribute-Based Access Control Policies: An Overview [J]. 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 41 - 49