共 49 条
[1]
Alramadhan M, 2017, 2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017)
[2]
[Anonymous], 1974, The Design and Analysis of Computer Algorithms
[3]
Barkley J., 1997, P 2 ACM WORKSH ROL B, P127, DOI [10.1145/266741.266769, DOI 10.1145/266741.266769]
[4]
Bell DE, 1976, MTR-2997
[5]
Bertet K, 1997, INT KRUSE S KNOWL RE, P72
[7]
Biba K., 1977, Tech. Rep. TR-3153
[8]
Birkhoff G., 1967, Lattice theory, V3
[9]
Bishop M., 2019, Computer security, Art and Science, VSecond
[10]
On the Feasibility of Attribute-Based Access Control Policy Mining
[J].
2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019),
2019,
:245-252