Subject
Law,General Computer Science
Reference40 articles.
1. Discovery of optimal factors in binary data via a novel method of matrix decomposition;Belohlavek;J Comput Syst Sci,2010
2. TRBAC: a temporal role-based access control model;Bertino;ACM Trans Inf Syst Secur (TISSEC),2001
3. Constrained role mining;Blundo,2012
4. Mining stable roles in RBAC;Colantonio,2009
5. Taming role mining complexity in RBAC;Colantonio;Comput Secur,2010
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献