共 50 条
- [2] Mining Attribute-Based Access Control Policies INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
- [3] Mining Least Privilege Attribute Based Access Control Policies 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 404 - 416
- [4] Mining Attribute-Based Access Control Policies from RBAC Policies 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
- [5] Mining Attribute-Based Access Control Policies from Logs DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
- [6] VisMAP: Visual Mining of Attribute-Based Access Control Policies INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 79 - 98
- [8] An Unsupervised Learning Based Approach for Mining Attribute Based Access Control Policies 2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 1427 - 1436
- [9] BUXMiner: An efficient bottom-up approach to mining XML query patterns ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2007, 4505 : 709 - +
- [10] Parallel Concept Computing Based on Bottom-Up Decomposition of Attribute Topology Zhang, Tao (zhtao@ysu.edu.cn), 1600, Chinese Academy of Sciences (28): : 3129 - 3145