共 50 条
- [2] Mining Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
- [3] Mining Least Privilege Attribute Based Access Control Policies [J]. 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 404 - 416
- [4] Mining Attribute-Based Access Control Policies from RBAC Policies [J]. 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
- [5] Mining Attribute-Based Access Control Policies from Logs [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
- [6] VisMAP: Visual Mining of Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 79 - 98
- [7] An Unsupervised Learning Based Approach for Mining Attribute Based Access Control Policies [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 1427 - 1436
- [8] BUXMiner: An efficient bottom-up approach to mining XML query patterns [J]. ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2007, 4505 : 709 - +
- [9] A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 489 - 506
- [10] Representing Attribute Based Access Control Policies in OWL [J]. 2016 IEEE TENTH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2016, : 332 - 335