Role engineering using graph optimisation D Zhang, K Ramamohanarao, T Ebringer Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 186 | 2007 |
Permission set mining: Discovering practical and useful roles D Zhang, K Ramamohanarao, T Ebringer, T Yann Computer Security Applications Conference, 2008. ACSAC 2008. Annual, 247-256, 2008 | 43 | 2008 |
Rolevat: Visual assessment of practical need for role based access control D Zhang, K Ramamohanarao, S Versteeg, R Zhang Computer Security Applications Conference, 2009. ACSAC'09. Annual, 13-22, 2009 | 36 | 2009 |
Graph based strategies to role engineering D Zhang, K Ramamohanarao, S Versteeg, R Zhang Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 24 | 2010 |
An evaluation technique for network intrusion detection systems D Zhang, C Leckie Proceedings of the 1st international conference on Scalable information …, 2006 | 16 | 2006 |
Efficient Graph Based Approach to Large Scale Role Engineering. D Zhang, K Ramamohanarao, R Zhang, S Versteeg Trans. Data Privacy 7 (1), 1-26, 2014 | 9 | 2014 |
Synthetic data generation for study of role engineering D Zhang, K Ramamohanarao, R Zhang | 7 | 2008 |
Data Mining for Role Based Access Control D Zhang, K Ramamohanarao, T Ebringer, J Bailey University of Melbourne, School of Engineering, 2010 | 4 | 2010 |
Network Intrusion Detection Techniques for Single Source and Coordinated Scans D Zhang Honours thesis, The University Of Melbourne, 2005 | 1 | 2005 |
Towards Declarative Monitoring of Declarative Service Compositions K Taylor, P Brebner, M Kearney, D Zhang, K Lam, V Tosic Data Engineering Workshop, 2007 IEEE 23rd International Conference on, 315-322, 2007 | | 2007 |