A survey of role mining

B Mitra, S Sural, J Vaidya, V Atluri - ACM Computing Surveys (CSUR), 2016‏ - dl.acm.org
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …

A hybrid approach to clustering in big data

D Kumar, JC Bezdek, M Palaniswami… - IEEE transactions on …, 2015‏ - ieeexplore.ieee.org
Clustering of big data has received much attention recently. In this paper, we present a new
clusiVAT algorithm and compare it with four other popular data clustering algorithms. Three …

Visual approaches for exploratory data analysis: A survey of the visual assessment of clustering tendency (vat) family of algorithms

D Kumar, JC Bezdek - IEEE Systems, Man, and Cybernetics …, 2020‏ - ieeexplore.ieee.org
Exploratory data analysis (EDA) using data clustering is extremely important for
understanding the basic characteristics of a novel data set before develo** complex …

On the definition of role mining

M Frank, JM Buhmann, D Basin - … of the 15th ACM symposium on Access …, 2010‏ - dl.acm.org
There have been many approaches proposed for role mining. However, the problems
solved often differ due to a lack of consensus on the formal definition of the role mining …

[كتاب][B] Elementary Cluster Analysis: Four Basic Methods that (Usually) Work

JC Bezdek - 2022‏ - taylorfrancis.com
The availability of packaged clustering programs means that anyone with data can easily do
cluster analysis on it. But many users of this technology don't fully appreciate its many …

[PDF][PDF] Big Data Clustering Using Improvised Fuzzy C-Means Clustering.

V Rayala, SR Kalli - Rev. d'Intelligence Artif., 2020‏ - academia.edu
Accepted: 30 November 2020 Clustering emerged as powerful mechanism to analyze the
massive data generated by modern applications; the main aim of it is to categorize the data …

An actor-based, application-aware access control evaluation framework

WC Garrison, AJ Lee, TL Hinrichs - … of the 19th ACM symposium on …, 2014‏ - dl.acm.org
To date, most work regarding the formal analysis of access control schemes has focused on
quantifying and comparing the expressive power of a set of schemes. Although expressive …

Enhancement of business it alignment by including responsibility components in RBAC

C Feltus, M Petit, M Sloman - Proceedings of the …, 2010‏ - researchportal.unamur.be
Good corporate governance requires an improvement of the definition and the enforcement
of the employees' responsibility throughout the companies' processes. In the field of …

An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC)

M Komlenovic, M Tripunitara, T Zitouni - … of the first ACM conference on …, 2011‏ - dl.acm.org
We consider the distributed access enforcement problem for Role-Based Access Control
(RBAC) systems. Such enforcement has become important with RBAC's increasing …

Visual assessment of clustering tendency for incomplete data

LAF Park, JC Bezdek, C Leckie… - … on Knowledge and …, 2016‏ - ieeexplore.ieee.org
The iVAT (asiVAT) algorithms reorder symmetric (asymmetric) dissimilarity data so that an
image of the data may reveal cluster substructure. Images formed from incomplete data don't …