Semantic analysis of role mining results and shadowed roles detection
Tài liệu tham khảo
Ahn, 2007, Towards realizing a formal RBAC model in real systems, 215
Armando, 2012, Automated and efficient analysis of role-based access control with attributes, vol. 7371, 25
Armando, 2012, Efficient run-time solving of RBAC user authorization queries: pushing the envelope, 241
Barletta, 2011, Workflow and access control reloaded: a declarative specification framework for the automated analysis of web services, Scalable Computing: Practice and Experience, 12
Baumgrass, 2011, Deriving current state RBAC models from event logs, 667
Baumgrass, 2012, An approach to bridge the gap between role mining and role engineering via migration guides, 113
Colantonio, 2008, Leveraging lattices to improve role mining, 333
Colantonio, 2009, Mining stable roles in RBAC, 259
Colantonio, 2011, A new role mining framework to elicit business roles and to mitigate enterprise risk, Decision Support Systems, 50, 715, 10.1016/j.dss.2010.08.022
Ferraiolo, 2001
Frank, 2009, A probabilistic approach to hybrid role mining, 101
Frank, 2010, On the definition of role mining, 35
Fuchs, 2011, The role mining process model – underlining the need for a comprehensive research perspective, 35
Fuchs, 2011, Roles in information security – a survey and classification of the research area, Computers & Security, 30, 748, 10.1016/j.cose.2011.08.002
Gallaher, 2002
Goodstein, 2007
Hachana, 2012, Role mining to assist authorization governance: how far have we gone?, International Journal of Secure Software Engineering (IJSSE), 3
Hachana, 2012, Towards automated assistance for mined roles analysis in role mining applications, 123
Haidar, 2006, An extended RBAC profile of XACML, 13
Koyuturk, 2006, Nonorthogonal decomposition of binary matrices for bounded-error data compression and analysis, ACM Transactions on Mathematical Software, 32, 33, 10.1145/1132973.1132976
Kuhlmann, 2003, Role mining – revealing business roles for security administration using data mining technology, 179
Lee, 2000, Algorithms for non-negative matrix factorization, 556
Molloy, 2009, Evaluating role mining algorithms, 95
Molloy, 2010, Mining roles with noisy data, 45
Sandhu, 1996, Role-based access control model, IEEE Computer, 29, 38, 10.1109/2.485845
Streich, 2009, Multi-assignment clustering for Boolean data, 969
Takabi, 2010, StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy, 55
Vaidya, 2006, RoleMiner: mining roles using subset enumeration, 144
Vaidya, 2007, The role mining problem: finding a minimal descriptive set of roles, 175
Vaidya, 2008, Migrating to optimal RBAC with minimal perturbation, 11
Verde, 2012, Role engineering: from theory to practice, 181
Zhang, 2007, Role engineering using graph optimisation, 139
