Author:
Blundo Carlo,Cimato Stelvio
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Blundo, C., Cimato, S.: A simple role mining algorithm. In: Proceedings of the 2010 ACM Symposium on Applied Computing, SAC 2010, pp. 1958–1962. ACM, New York (2010),
http://doi.acm.org/10.1145/1774088.1774503
2. Blundo, C., Cimato, S.: Constrained role mining. arXiv:1203.3744v1 [cs.CR] (2012)
3. Lecture Notes in Computer Science;L. Chen,2009
4. Coyne, E.J.: Role engineering. In: ACM Workshop on Role-Based Access Control (1995)
5. Dinur, I., Safra, S.: On the hardness of approximating minimum vertex cover. Annals of Mathematics 162 (2004, 2005)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Heuristics for constrained role mining in the post-processing framework;Journal of Ambient Intelligence and Humanized Computing;2022-01-25
2. PostProcessing in Constrained Role Mining;Intelligent Data Engineering and Automated Learning – IDEAL 2018;2018
3. Policy Engineering in RBAC and ABAC;Lecture Notes in Computer Science;2018
4. Migrating from RBAC to temporal RBAC;IET Information Security;2017-09
5. Reconfiguration of RBAC schemes by genetic algorithms;Intelligent Distributed Computing X;2016-10-08