A survey of role mining
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
Modular domain specific languages and tools
P Hudak - … . Fifth international conference on software reuse …, 1998 - ieeexplore.ieee.org
A domain specific language (DSL) allows one to develop software for a particular
application domain quickly and effectively, yielding programs that are easy to understand …
application domain quickly and effectively, yielding programs that are easy to understand …
Toward deep learning based access control
A common trait of current access control approaches is the challenging need to engineer
abstract and intuitive access control models. This entails designing access control …
abstract and intuitive access control models. This entails designing access control …
Action recognition via local descriptors and holistic features
X Sun, M Chen, A Hauptmann - 2009 IEEE computer society …, 2009 - ieeexplore.ieee.org
In this paper we propose a unified action recognition framework fusing local descriptors and
holistic features. The motivation is that the local descriptors and holistic features emphasize …
holistic features. The motivation is that the local descriptors and holistic features emphasize …
An automatic attribute-based access control policy extraction from access logs
With the rapid advances in computing and information technologies, traditional access
control models have become inadequate in terms of capturing fine-grained, and expressive …
control models have become inadequate in terms of capturing fine-grained, and expressive …
Mining permission request patterns from android and facebook applications
Android and Facebook provide third-party applications with access to users' private data and
the ability to perform potentially sensitive operations (eg, post to a user's wall or place phone …
the ability to perform potentially sensitive operations (eg, post to a user's wall or place phone …
A framework integrating attribute-based policies into role-based access control
Integrated role-based access control (RBAC) and attribute-based access control (ABAC) is
emerging as a promising paradigm. This paper proposes a framework that uses attribute …
emerging as a promising paradigm. This paper proposes a framework that uses attribute …
Mining positive and negative attribute-based access control policy rules
Mining access control policies can reduce the burden of adopting more modern access
control models by automating the process of generating policies based on existing …
control models by automating the process of generating policies based on existing …
Policy Engineering in RBAC and ABAC
Abstract Role-based Access Control (RBAC) and Attribute-based access control (ABAC) are
the most widely used access control models for mediating controlled access to resources in …
the most widely used access control models for mediating controlled access to resources in …
Managing constraints in role based access control
Role-based access control (RBAC) is the most popular access control model currently
adopted in several contexts to define security management. Constraints play a crucial role …
adopted in several contexts to define security management. Constraints play a crucial role …