Asian Journal of Information Technology
Year:
2014
Volume:
13
Issue:
8
Page No.
416 - 421
References
Colantonio, A., R. Di Pietro and A. Ocello, 2008. A cost-driven approach to role engineering. Proceedings of the ACM symposium on Applied Computing, March 16-20, Fortaleza, Ceara, Brazil, pp: 2129-2136.
Colantonio, A., R. Di Pietro and A. Ocello, 2008. Leveraging lattices to improve role mining. Proceedings of the IFIP 20th World Computer Congress, September 7-10, 2008, Milano, Italy, pp: 333-347.
Colantonio, A., R. Di Pietro, A. Ocello and N.V. Verde, 2009. A formal framework to elicit roles with business meaning in RBAC systems. Proceedings of the 14th ACM symposium on Access control models and technologies, June 3-5, 2009, Stresa, Italy, pp: 85-94.
Colantonio, A., R. Di Pietro, A. Ocello and N.V. Verde, 2010. Taming role mining complexity in RBAC. Comput. Secur., 29: 548-564.
Colantonio, A., R. Di Pietro, A. Ocello and N.V. Verde, 2012. Visual role mining: A picture is worth a thousand roles. Knowl. Data Eng., 24: 1120-1133.
CrossRef | Colantonio, A., R. Di Pietro, Ocello and N.V. Verde, 2010. ABBA: Adaptive bicluster-based approach to impute missing values in binary matrices. Proceedings of the 2010 ACM Symposium on Applied Computing, March 22-26, 2010, Sierre, Switzerland, pp: 1026-1033.
Coyne, E.J., 1995. Role engineering. Proceedings of the 1st ACM Workshop on Role-Based Access Control, November 30-December 2, 1995, Gaithersburg, Maryland, USA., pp: 15-16.
Di Vimercati, S.D.C., S. Foresti, P. Samarati and S. Jajodia, 2007. Access control policies and languages. Int. J. Comput. Sci. Eng., 3: 94-102.
Direct Link | Fekete, J.D., J.J. Van Wijk, J.T. Stasko and C. North, 2008. The Value of Information Visualization. In: Information Visualization, Fekete, J.D., J.J. van Wijk, J.T. Stasko and C. North (Eds.). Springer, Berlin, Germany, ISBN: 978-3-540-70956-5, pp: 1-18.
Ferraiolo, D.F., R. Sandhu, S. Gavrila, D.R. Kuhn and R. Chandramouli, 2001. Proposed NIST standard for role-based access control. Trans. Inform. Syst. Secur., 4: 224-2743.
CrossRef | Frank, M., A.P. Streich, D. Basin and J.M. Buhmann, 2009. A probabilistic approach to hybrid role mining. Proceedings of the 16th ACM conference on Computer and Communications Security, November 9-13, 2009, Chicago, Illinois, USA., pp: 101-111.
Frank, M., D. Basin and J.M. Buhmann, 2008. A class of probabilistic models for role engineering. Proceedings of the 15th ACM Conference on Computer and Communications Security, October 27 to October 31, 2008, Alexandria, VA, USA., pp: 299-310.
Geerts, F., B. Goethals and T. Mielikainen, 2004. Tiling databases. Proceedings of the 7th International Conference on Discovery Science, October 2-5, 2004, Padova, Italy, pp: 278-289.
Guo, Q., J. Vaidya and V. Atluri, 2008. The role hierarchy mining problem: Discovery of optimal role hierarchies. Proceedings of the Computer Security Applications Conference, December 8-12 2008, Anaheim, CA, pp: 237-246.
Kuhlmann, M., D. Shohat and G. Schimpf, 2003. Role mining-revealing business roles for security administration using data mining technology. Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, June 2-3, 2003, Villa Gallia, Como, Italy, pp: 179-186.
Molloy, I., N. Li, T. Li, Z. Mao, Q. Wang and J. Lobo, 2009. Evaluating role mining algorithms. Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, June 3-5, 2009, Stresa, Italy, pp: 95-104.
Vaidya, J., V. Atluri and J. Warner, 2006. RoleMiner: Mining roles using subset enumeration. Proceedings of the 13th ACM conference on Computer and Communications Security, October 30-November 3, 2006, Alexandria, Virginia, USA., pp: 144-153.
Vaidya, J., V. Atluri and Q. Guo, 2007. The role mining problem: Finding a minimal descriptive set of roles. Proceedings of the 12th ACM symposium on Access Control Models and Technologies, June 20-22, 2007, France, pp: 175-184.