共 52 条
[1]
[Anonymous], 1974, Commun. Statist.-Simul. Comput., DOI DOI 10.1080/03610927408827101
[2]
Baltrunas L., 2015, COMPUT SCI, P1
[3]
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[4]
Bertino Elisa., 2005, SACMAT 05, P29
[5]
Bui T., 2020, LEARNING ATTRIBUTE B
[6]
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies
[J].
SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES,
2020,
:167-178
[7]
Chandran SM, 2005, LECT NOTES COMPUT SC, V3806, P361
[8]
Chen Fenxiao, 2020, APSIPA TRANS SIGNAL, V9, P1
[9]
Corradi A., 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference. COMPSAC 2004, P444, DOI 10.1109/CMPSAC.2004.1342877
[10]
Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes
[J].
SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES,
2018,
:213-215