A survey of role mining

B Mitra, S Sural, J Vaidya, V Atluri - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …

[BUCH][B] Information security management handbook

HF Tipton, M Krause - 2007 - taylorfrancis.com
Considered the gold-standard reference on information security, the Information Security
Management Handbook provides an authoritative compilation of the fundamental …

Modular domain specific languages and tools

P Hudak - … . Fifth international conference on software reuse …, 1998 - ieeexplore.ieee.org
A domain specific language (DSL) allows one to develop software for a particular
application domain quickly and effectively, yielding programs that are easy to understand …

Exploiting multi-grain ranking constraints for precisely searching visually-similar vehicles

K Yan, Y Tian, Y Wang, W Zeng… - Proceedings of the …, 2017 - openaccess.thecvf.com
Precise search of visually-similar vehicles poses a great challenge in computer vision, which
needs to find exactly the same vehicle among a massive vehicles with visually similar …

Mining roles with semantic meanings

I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino… - Proceedings of the 13th …, 2008 - dl.acm.org
With the growing adoption of role-based access control (RBAC) in commercial security and
identity management products, how to facilitate the process of migrating a non-RBAC system …

Roleminer: mining roles using subset enumeration

J Vaidya, V Atluri, J Warner - Proceedings of the 13th ACM conference …, 2006 - dl.acm.org
Role engineering, the task of defining roles and associating permissions to them, is
essential to realize the full benefits of the role-based access control paradigm. Essentially …

Authorisation and access control for electronic health record systems

B Blobel - International journal of medical informatics, 2004 - Elsevier
Enabling the shared care paradigm, centralised or even decentralised electronic health
record (EHR) systems increasingly become core applications in hospital information …

An approach for the systematic development of domain‐specific languages

M Strembeck, U Zdun - Software: Practice and Experience, 2009 - Wiley Online Library
Building tailored software systems for a particular application domain is a complex task. For
this reason, domain‐specific languages (DSLs) receive a constantly growing attention in …

Evaluating role mining algorithms

I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo - Proceedings of the 14th …, 2009 - dl.acm.org
While many role mining algorithms have been proposed in recent years, there lacks a
comprehensive study to compare these algorithms. These role mining algorithms have been …

Detecting objects, shadows and ghosts in video streams by exploiting color and motion information

R Cucchiara, C Grana, M Piccardi… - … conference on image …, 2001 - ieeexplore.ieee.org
Many approaches to moving object detection for traffic monitoring and video surveillance
proposed in the literature are based on background suppression methods. How to correctly …