Author:
Krautsevich Leanid,Lazouski Aliaksandr,Martinelli Fabio,Yautsiukhin Artsiom
Publisher
Springer International Publishing
Reference19 articles.
1. Aziz, B., Foley, S.N., Herbert, J., Swart, G.: Reconfiguring role based access control policies using risk semantics. J. High Speed Netw. 15(3), 261–273 (2006)
2. Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)
3. Celikel, E., Kantarcioglu, M., Thuraisingham, B., Bertino, E.: Usage control in computer security: a survey. Risk Decis. Anal. 1(1), 21–33 (2009)
4. Lecture Notes in Computer Science;L Chen,2012
5. Colantonio, A., Pietro, R.D., Ocello, A., Verde, N.V.: A new role mining framework to elicit business roles and to mitigate enterprise risk. Decis. Support Syst. 50(4), 715–731 (2011)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献