Concise: Compressed ‘n’composable integer set A Colantonio, R Di Pietro Information Processing Letters 110 (16), 644-650, 2010 | 119 | 2010 |
A cost-driven approach to role engineering A Colantonio, R Di Pietro, A Ocello Proceedings of the 2008 ACM symposium on Applied computing, 2129-2136, 2008 | 95 | 2008 |
A formal framework to elicit roles with business meaning in RBAC systems A Colantonio, R Di Pietro, A Ocello, NV Verde Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 81 | 2009 |
Visual role mining: A picture is worth a thousand roles A Colantonio, R Di Pietro, A Ocello, NV Verde IEEE Transactions on Knowledge and Data Engineering 24 (6), 1120-1133, 2011 | 67 | 2011 |
Taming role mining complexity in RBAC A Colantonio, R Di Pietro, A Ocello, NV Verde Computers & Security 29 (5), 548-564, 2010 | 54 | 2010 |
A new role mining framework to elicit business roles and to mitigate enterprise risk A Colantonio, R Di Pietro, A Ocello, NV Verde Decision Support Systems 50 (4), 715-731, 2011 | 51 | 2011 |
Leveraging lattices to improve role mining A Colantonio, RD Pietro, A Ocello IFIP International Information Security Conference, 333-347, 2008 | 38 | 2008 |
A business-driven decomposition methodology for role mining A Colantonio, R Di Pietro, NV Verde Computers & Security 31 (7), 844-855, 2012 | 37 | 2012 |
Role engineering: from theory to practice NV Verde, J Vaidya, V Atluri, A Colantonio Proceedings of the second ACM conference on Data and Application Security …, 2012 | 35 | 2012 |
Mining stable roles in RBAC A Colantonio, R Di Pietro, A Ocello, NV Verde IFIP International Information Security Conference, 259-269, 2009 | 32 | 2009 |
ABBA: Adaptive bicluster-based approach to impute missing values in binary matrices A Colantonio, R Di Pietro, A Ocello, NV Verde Proceedings of the 2010 ACM Symposium on Applied Computing, 1026-1033, 2010 | 30 | 2010 |
A probabilistic bound on the basic role mining problem and its applications A Colantonio, R Di Pietro, A Ocello, NV Verde IFIP International Information Security Conference, 376-386, 2009 | 26 | 2009 |
Role mining in business: taming role-based access control administration R Di Pietro, A Colantonio, A Ocello World Scientific, 2012 | 19 | 2012 |
Mining business-relevant RBAC states through decomposition A Colantonio, R Di Pietro, A Ocello, NV Verde IFIP International Information Security Conference, 19-30, 2010 | 19 | 2010 |
Expedite: Express closed itemset enumeration G Aliberti, A Colantonio, R Di Pietro, R Mariani Expert Systems with Applications 42 (8), 3933-3944, 2015 | 12 | 2015 |
Evaluating the risk of adopting RBAC roles A Colantonio, R Di Pietro, A Ocello, NV Verde IFIP Annual Conference on Data and Applications Security and Privacy, 303-310, 2010 | 12 | 2010 |
Prioritizing role engineering objectives using the analytic hierarchy process A Colantonio Information Systems: Crossroads for Organization, Management, Accounting and …, 2012 | 6 | 2012 |
Role mining techniques to improve RBAC administration A Colantonio Università degli studi Roma Tre, 2011 | 5 | 2011 |
Visual detection of singularities in review platforms A Colantonio, R Di Pietro, M Petrocchi, A Spognardi Proceedings of the 30th Annual ACM Symposium on Applied Computing, 1294-1295, 2015 | 3 | 2015 |
An activity-based model for separation of duty A Colantonio, R Di Pietro, A Ocello arXiv preprint arXiv:0810.5351, 2008 | 2 | 2008 |