Author:
Anderer Simon,Scheuermann Bernd,Mostaghim Sanaz
Publisher
Springer Nature Switzerland
Reference26 articles.
1. PwC, PwC’s Global Economic Crime and Fraud Survey 2022. PricewaterhouseCoopers (2022)
2. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38–47 (1996)
3. Vaidya, J., Atluri, V., Guo, Q.: The role mining problem. In: Proceedings of the 12th ACM SACMAT, Sophia Antipolis, France, 20–22 June 2007, pp. 175–184 (2007)
4. Blundo, C., Cimato, S.: A simple role mining algorithm. In: Proceedings of the ACM SAC, Sierre, Switzerland, 22–26 March 2010, pp. 1958–1962 (2010)
5. Lecture Notes in Computer Science;R Kumar,2010