Results 241 to 249 of about 12,389 (249)
Some of the next articles are maybe not open access.
Taming role mining complexity in RBAC
Computers & Security, 2010In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to roles; second, we identify user-permission assignments that cannot belong to roles with a weight exceeding a given threshold; and third, we restrict the role-finding problem to ...
COLANTONIO A+3 more
openaire +3 more sources
Proceedings of the first ACM Workshop on Role-based access control - RBAC '95, 1996
openaire +2 more sources
openaire +2 more sources
Proceedings of the first ACM Workshop on Role-based access control - RBAC '95, 1996
openaire +2 more sources
openaire +2 more sources
RBAC on the Web by smart certificates
Proceedings of the fourth ACM workshop on Role-based access control, 1999Ravi Sandhu, Joon S. Park
openaire +2 more sources
Proceedings of the first ACM Workshop on Role-based access control - RBAC '95, 1996
openaire +2 more sources
openaire +2 more sources