共 21 条
- [1] A Deep Learning Approach for Extracting Attributes of ABAC Policies [J]. SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 137 - 148
- [2] [Anonymous], 2013, MARKET TRENDS CLOUD
- [3] PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining [J]. 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 149 - 154
- [5] [房梁 Fang Liang], 2017, [计算机学报, Chinese Journal of Computers], V40, P1680
- [6] Hu VC, 2014, National Institute of Standards and Technology Special Publication, V800, P162
- [8] Mining Positive and Negative Attribute-Based Access Control Policy Rules [J]. SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 161 - 172
- [9] Karimi L, 2018, IEEE INT CONF BIG DA, P1427, DOI 10.1109/BigData.2018.8622037