A survey of role mining
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
A hybrid approach to clustering in big data
Clustering of big data has received much attention recently. In this paper, we present a new
clusiVAT algorithm and compare it with four other popular data clustering algorithms. Three …
clusiVAT algorithm and compare it with four other popular data clustering algorithms. Three …
Visual approaches for exploratory data analysis: A survey of the visual assessment of clustering tendency (vat) family of algorithms
Exploratory data analysis (EDA) using data clustering is extremely important for
understanding the basic characteristics of a novel data set before develo** complex …
understanding the basic characteristics of a novel data set before develo** complex …
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems
solved often differ due to a lack of consensus on the formal definition of the role mining …
solved often differ due to a lack of consensus on the formal definition of the role mining …
[كتاب][B] Elementary Cluster Analysis: Four Basic Methods that (Usually) Work
JC Bezdek - 2022 - taylorfrancis.com
The availability of packaged clustering programs means that anyone with data can easily do
cluster analysis on it. But many users of this technology don't fully appreciate its many …
cluster analysis on it. But many users of this technology don't fully appreciate its many …
[PDF][PDF] Big Data Clustering Using Improvised Fuzzy C-Means Clustering.
V Rayala, SR Kalli - Rev. d'Intelligence Artif., 2020 - academia.edu
Accepted: 30 November 2020 Clustering emerged as powerful mechanism to analyze the
massive data generated by modern applications; the main aim of it is to categorize the data …
massive data generated by modern applications; the main aim of it is to categorize the data …
An actor-based, application-aware access control evaluation framework
To date, most work regarding the formal analysis of access control schemes has focused on
quantifying and comparing the expressive power of a set of schemes. Although expressive …
quantifying and comparing the expressive power of a set of schemes. Although expressive …
Enhancement of business it alignment by including responsibility components in RBAC
Good corporate governance requires an improvement of the definition and the enforcement
of the employees' responsibility throughout the companies' processes. In the field of …
of the employees' responsibility throughout the companies' processes. In the field of …
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC)
We consider the distributed access enforcement problem for Role-Based Access Control
(RBAC) systems. Such enforcement has become important with RBAC's increasing …
(RBAC) systems. Such enforcement has become important with RBAC's increasing …
Visual assessment of clustering tendency for incomplete data
The iVAT (asiVAT) algorithms reorder symmetric (asymmetric) dissimilarity data so that an
image of the data may reveal cluster substructure. Images formed from incomplete data don't …
image of the data may reveal cluster substructure. Images formed from incomplete data don't …