共 21 条
[1]
A Scalable Role Mining Approach for Large Organizations
[J].
PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2021,
2021,
:45-54
[2]
Polisma - A Framework for Learning Attribute-Based Access Control Policies
[J].
COMPUTER SECURITY - ESORICS 2020, PT I,
2020, 12308
:523-544
[4]
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
[5]
The Secrecy Resilience of Access Control Policies and Its Application to Role Mining
[J].
PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022,
2022,
:115-126
[6]
Hao YR, 2021, AAAI CONF ARTIF INTE, V35, P12963
[8]
Hu VincentC., 2013, NIST SPECIAL PUBLICA, V800, P162, DOI DOI 10.6028/NIST.SP.800-162
[9]
Mining Positive and Negative Attribute-Based Access Control Policy Rules
[J].
SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES,
2018,
:161-172