共 25 条
[1]
[Anonymous], 2013, J WIRELESS COMMUNICA
[2]
[Anonymous], MTR2997 MITR CORP
[3]
[Anonymous], 1979, COMPUTERS INTRACTABI
[4]
Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering
[J].
ABAC'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON ATTRIBUTE BASED ACCESS CONTROL,
2016,
:72-75
[5]
Blundo C., 2010, Proceedings of the 2010 ACM Symposium on Applied Computing, P1958
[6]
Colantonio A., 2014, IEEE T KNOWL DATA EN, V24, P1120
[8]
Colantonio A, 2009, INT FED INFO PROC, V297, P376
[9]
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[10]
Frank M, 2012, J MACH LEARN RES, V13, P459