Author:
Stoller Scott D.,Bui Thang
Publisher
Springer International Publishing
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Next 700 Policy Miners;Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security;2019-11-06
2. An efficiency approach for RBAC reconfiguration with minimal roles and perturbation;Concurrency and Computation: Practice and Experience;2017-12-17
3. Mining hierarchical temporal roles with multiple metrics;Journal of Computer Security;2017-11-30