A survey of role mining
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
[BUCH][B] Information security management handbook
HF Tipton, M Krause - 2007 - taylorfrancis.com
Considered the gold-standard reference on information security, the Information Security
Management Handbook provides an authoritative compilation of the fundamental …
Management Handbook provides an authoritative compilation of the fundamental …
Modular domain specific languages and tools
P Hudak - … . Fifth international conference on software reuse …, 1998 - ieeexplore.ieee.org
A domain specific language (DSL) allows one to develop software for a particular
application domain quickly and effectively, yielding programs that are easy to understand …
application domain quickly and effectively, yielding programs that are easy to understand …
Exploiting multi-grain ranking constraints for precisely searching visually-similar vehicles
Precise search of visually-similar vehicles poses a great challenge in computer vision, which
needs to find exactly the same vehicle among a massive vehicles with visually similar …
needs to find exactly the same vehicle among a massive vehicles with visually similar …
Mining roles with semantic meanings
With the growing adoption of role-based access control (RBAC) in commercial security and
identity management products, how to facilitate the process of migrating a non-RBAC system …
identity management products, how to facilitate the process of migrating a non-RBAC system …
Roleminer: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is
essential to realize the full benefits of the role-based access control paradigm. Essentially …
essential to realize the full benefits of the role-based access control paradigm. Essentially …
Authorisation and access control for electronic health record systems
B Blobel - International journal of medical informatics, 2004 - Elsevier
Enabling the shared care paradigm, centralised or even decentralised electronic health
record (EHR) systems increasingly become core applications in hospital information …
record (EHR) systems increasingly become core applications in hospital information …
An approach for the systematic development of domain‐specific languages
Building tailored software systems for a particular application domain is a complex task. For
this reason, domain‐specific languages (DSLs) receive a constantly growing attention in …
this reason, domain‐specific languages (DSLs) receive a constantly growing attention in …
Evaluating role mining algorithms
While many role mining algorithms have been proposed in recent years, there lacks a
comprehensive study to compare these algorithms. These role mining algorithms have been …
comprehensive study to compare these algorithms. These role mining algorithms have been …
Detecting objects, shadows and ghosts in video streams by exploiting color and motion information
Many approaches to moving object detection for traffic monitoring and video surveillance
proposed in the literature are based on background suppression methods. How to correctly …
proposed in the literature are based on background suppression methods. How to correctly …