Asian Journal of Information Technology

Year: 2014
Volume: 13
Issue: 8
Page No. 416 - 421

Graphical Data Mining using Hybrid Role Engineering Approach

Authors : R. Suguna, Divya Mohandass and R. Poorni

References

Colantonio, A., R. Di Pietro and A. Ocello, 2008. A cost-driven approach to role engineering. Proceedings of the ACM symposium on Applied Computing, March 16-20, Fortaleza, Ceara, Brazil, pp: 2129-2136.

Colantonio, A., R. Di Pietro and A. Ocello, 2008. Leveraging lattices to improve role mining. Proceedings of the IFIP 20th World Computer Congress, September 7-10, 2008, Milano, Italy, pp: 333-347.

Colantonio, A., R. Di Pietro, A. Ocello and N.V. Verde, 2009. A formal framework to elicit roles with business meaning in RBAC systems. Proceedings of the 14th ACM symposium on Access control models and technologies, June 3-5, 2009, Stresa, Italy, pp: 85-94.

Colantonio, A., R. Di Pietro, A. Ocello and N.V. Verde, 2010. Taming role mining complexity in RBAC. Comput. Secur., 29: 548-564.

Colantonio, A., R. Di Pietro, A. Ocello and N.V. Verde, 2012. Visual role mining: A picture is worth a thousand roles. Knowl. Data Eng., 24: 1120-1133.
CrossRef  |  

Colantonio, A., R. Di Pietro, Ocello and N.V. Verde, 2010. ABBA: Adaptive bicluster-based approach to impute missing values in binary matrices. Proceedings of the 2010 ACM Symposium on Applied Computing, March 22-26, 2010, Sierre, Switzerland, pp: 1026-1033.

Coyne, E.J., 1995. Role engineering. Proceedings of the 1st ACM Workshop on Role-Based Access Control, November 30-December 2, 1995, Gaithersburg, Maryland, USA., pp: 15-16.

Di Vimercati, S.D.C., S. Foresti, P. Samarati and S. Jajodia, 2007. Access control policies and languages. Int. J. Comput. Sci. Eng., 3: 94-102.
Direct Link  |  

Fekete, J.D., J.J. Van Wijk, J.T. Stasko and C. North, 2008. The Value of Information Visualization. In: Information Visualization, Fekete, J.D., J.J. van Wijk, J.T. Stasko and C. North (Eds.). Springer, Berlin, Germany, ISBN: 978-3-540-70956-5, pp: 1-18.

Ferraiolo, D.F., R. Sandhu, S. Gavrila, D.R. Kuhn and R. Chandramouli, 2001. Proposed NIST standard for role-based access control. Trans. Inform. Syst. Secur., 4: 224-2743.
CrossRef  |  

Frank, M., A.P. Streich, D. Basin and J.M. Buhmann, 2009. A probabilistic approach to hybrid role mining. Proceedings of the 16th ACM conference on Computer and Communications Security, November 9-13, 2009, Chicago, Illinois, USA., pp: 101-111.

Frank, M., D. Basin and J.M. Buhmann, 2008. A class of probabilistic models for role engineering. Proceedings of the 15th ACM Conference on Computer and Communications Security, October 27 to October 31, 2008, Alexandria, VA, USA., pp: 299-310.

Geerts, F., B. Goethals and T. Mielikainen, 2004. Tiling databases. Proceedings of the 7th International Conference on Discovery Science, October 2-5, 2004, Padova, Italy, pp: 278-289.

Guo, Q., J. Vaidya and V. Atluri, 2008. The role hierarchy mining problem: Discovery of optimal role hierarchies. Proceedings of the Computer Security Applications Conference, December 8-12 2008, Anaheim, CA, pp: 237-246.

Kuhlmann, M., D. Shohat and G. Schimpf, 2003. Role mining-revealing business roles for security administration using data mining technology. Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, June 2-3, 2003, Villa Gallia, Como, Italy, pp: 179-186.

Molloy, I., N. Li, T. Li, Z. Mao, Q. Wang and J. Lobo, 2009. Evaluating role mining algorithms. Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, June 3-5, 2009, Stresa, Italy, pp: 95-104.

Vaidya, J., V. Atluri and J. Warner, 2006. RoleMiner: Mining roles using subset enumeration. Proceedings of the 13th ACM conference on Computer and Communications Security, October 30-November 3, 2006, Alexandria, Virginia, USA., pp: 144-153.

Vaidya, J., V. Atluri and Q. Guo, 2007. The role mining problem: Finding a minimal descriptive set of roles. Proceedings of the 12th ACM symposium on Access Control Models and Technologies, June 20-22, 2007, France, pp: 175-184.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved