Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference27 articles.
1. Baumgrass, A, Strembeck M (2013) Bridging the gap between role mining and role engineering via migration guides. Inf Secur Tech Rep 17(4):148–72.
2. Benedetti, M, Mori M (2018) Parametric RBAC Maintenance via Max-SAT In: Proceedings of the 23rd ACM on Symposium on Access Control Models and Technologies, 15–25.. ACM, Indianapolis, Indiana.
3. Colantonio, A, Di Pietro R, Ocello A (2008) A cost-driven approach to role engineering In: Proceedings of the 2008 ACM symposium on Applied computing, 2129–2136.. ACM, Fortaleza, Ceara.
4. Cook, SA (1971) The complexity of theorem-proving procedures In: Proceedings of the third annual ACM symposium on Theory of computing, 151–158.. ACM, Shaker Heights, Ohio.
5. Ferraiolo, DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed nist standard for role-based access control. ACM Trans Inf Syst Secur (TISSEC) 4(3):224–274.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献