共 30 条
[1]
A Deep Learning Approach for Extracting Attributes of ABAC Policies
[J].
SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES,
2018,
:137-148
[2]
Beckerle Matthias., 2013, Proceedings of the Ninth Symposium on Usable Privacy and Security, page, P2
[3]
Bogaerts Jasper., 2015, P 31 ANN COMP SEC AP, P291, DOI 10.1145/2818000.2818009
[4]
Breiman L, 1984, Classification and Regression Trees, V1st, DOI DOI 10.1201/9781315139470
[5]
Bui T, 2020, Arxiv, DOI arXiv:1909.12095
[6]
Efficient and Extensible Policy Mining for Relationship-Based Access Control
[J].
PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19),
2019,
:161-172
[8]
Bui Thang, 2018, LECT NOTES COMPUTER, V1358
[9]
Cheng Y, 2012, LECT NOTES COMPUT SC, V7371, P8, DOI 10.1007/978-3-642-31540-4_2
[10]
The Next 700 Policy Miners: A Universal Method for Building Policy Miners
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:95-112