共 50 条
- [1] Mining Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
- [3] Mining Attribute-Based Access Control Policies from RBAC Policies [J]. 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
- [4] Mining Attribute-Based Access Control Policies from Logs [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
- [5] VisMAP: Visual Mining of Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 79 - 98
- [6] Polisma - A Framework for Learning Attribute-Based Access Control Policies [J]. COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 523 - 544
- [7] Deconflicting policies in attribute-based access control systems [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
- [8] Attribute-based access control policies composition algebra [J]. Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 403 - 414
- [9] Evolutionary Inference of Attribute-Based Access Control Policies [J]. EVOLUTIONARY MULTI-CRITERION OPTIMIZATION, PT I, 2015, 9018 : 351 - 365
- [10] On the Feasibility of Attribute-Based Access Control Policy Mining [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252