Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of role mining
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
Policy Engineering in RBAC and ABAC
Abstract Role-based Access Control (RBAC) and Attribute-based access control (ABAC) are
the most widely used access control models for mediating controlled access to resources in …
the most widely used access control models for mediating controlled access to resources in …
Mining meaningful and rare roles from web application usage patterns
Role mining refers to the problem of discovering an optimal set of roles from existing user
permissions. Most role mining algorithms, use the full set of user-permission assignments …
permissions. Most role mining algorithms, use the full set of user-permission assignments …
An improved minimal noise role mining algorithm based on role interpretability
Interpretable role mining has achieved notable improvements in usability and effectiveness
of roles in RBAC deployments, owing to its virtue in mining meaningful roles. However …
of roles in RBAC deployments, owing to its virtue in mining meaningful roles. However …
A business-driven decomposition methodology for role mining
It is generally accepted that role mining–that is, the discovery of roles through the automatic
analysis of data from existing access control systems–must count on business requirements …
analysis of data from existing access control systems–must count on business requirements …
Automatic top-down role engineering framework using natural language processing techniques
A challenging problem in managing large networks is the complexity of security
administration. Role Based Access Control (RBAC) is the most well-known access control …
administration. Role Based Access Control (RBAC) is the most well-known access control …
RMMDI: A Novel Framework for Role Mining Based on the Multi‐Domain Information
W Bai, Z Pan, S Guo, Z Chen - Security and Communication …, 2019 - Wiley Online Library
Role‐based access control (RBAC) is widely adopted in network security management, and
role mining technology has been extensively used to automatically generate user roles from …
role mining technology has been extensively used to automatically generate user roles from …
Deriving current state RBAC models from event logs
A Baumgrass - 2011 sixth international conference on …, 2011 - ieeexplore.ieee.org
Process-aware information systems are used to execute business processes to reach the
operational goals of an organization. In this context, access control policies are defined to …
operational goals of an organization. In this context, access control policies are defined to …
Role mining based on permission cardinality constraint and user cardinality constraint
Constraint is an essential aspect of role‐based access control (RBAC) and is sometimes
argued to be the principle motivation for RBAC. However, most of role mining algorithms do …
argued to be the principle motivation for RBAC. However, most of role mining algorithms do …
Bridging the gap between role mining and role engineering via migration guides
In the context of role-based access control (RBAC), mining approaches, such as role mining
or organizational mining, can be applied to derive permissions and roles from a system's …
or organizational mining, can be applied to derive permissions and roles from a system's …