A survey of role mining

B Mitra, S Sural, J Vaidya, V Atluri - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …

Permission based Android security: Issues and countermeasures

Z Fang, W Han, Y Li - computers & security, 2014 - Elsevier
Android security has been a hot spot recently in both academic research and public
concerns due to numerous instances of security attacks and privacy leakage on Android …

How to discover high-quality roles? A survey and dependency analysis of quality criteria in role mining

M Kunz, L Fuchs, M Netter, G Pernul - International Conference on …, 2015 - Springer
Roles have evolved into the de facto standard for access control in Enterprise Identity
Management. However, companies struggle to develop and maintain a role-based access …

Analyzing quality criteria in role-based identity and access management

M Kunz, L Fuchs, M Netter… - … Conference on Information …, 2015 - ieeexplore.ieee.org
Roles have turned into the de facto standard for access control in enterprise identity
management systems. However, as roles evolve over time, companies struggle to develop …

APP Vetting Based on the Consistency of Description and APK

W Han, W Wang, X Zhang, W Peng, Z Fang - Trusted Systems: 6th …, 2015 - Springer
Android has witnessed a substantial growth over the years, in the market share as well as in
the number of malwares. In this paper, we proposed a novel approach to detect potentially …

Role mining: Survey and suggestion on role mining in access control

J Jia, J Guan, L Wang - International Symposium on Mobile Internet …, 2019 - Springer
With the increasing attacks of Network, various security defense mechanisms especially
access control mechanism have become research hot-spots, in which Role-Based Access …