Author:
Ait El Hadj Maryem,Benkaouz Yahya,Freisleben Bernd,Erradi Mohammed
Publisher
Springer International Publishing
Reference25 articles.
1. Al-Kahtani, M.A., Sandhu, R.: Induced role hierarchies with attribute-based RBAC. In: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, pp. 142–148. ACM (2003)
2. Amato, G., Falchi, F.: kNN based image classification relying on local feature similarity. In: Proceedings of the Third International Conference on SImilarity Search and APplications, pp. 101–108. ACM (2010)
3. Balana: Open source xacml 3.0 implementation (2012).
http://xacmlinfo.org/2012/08/16/balana-the-open-source-xacml-3-0-implementation/
4. Benkaouz, Y., Erradi, M., Freisleben, B.: Work in progress: K-nearest neighbors techniques for ABAC policies clustering. In: Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, pp. 72–75. ACM (2016)
5. Bhatia, N., et al.: Survey of nearest neighbor techniques. arXiv preprint
arXiv:1007.0085
(2010)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Anonymity in Attribute-Based Access Control: Framework and Metric;IEEE Transactions on Dependable and Secure Computing;2024-01
2. FLAP - A Federated Learning Framework for Attribute-based Access Control Policies;Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy;2023-04-24
3. XACSim: a new tool for measuring similarity of XACML security policies;Cluster Computing;2022-11-08
4. Optimization of Access Control Policies;Journal of Information Security and Applications;2022-11