Proceedings of the 19th ACM Symposium on Access Control Models and Technologies 2014
DOI: 10.1145/2613087.2613095
|View full text |Cite
|
Sign up to set email alerts
|

A system for risk awareness during role mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…This decreases the whole system's risk. And then we introduce user trust and user trust threshold in role in order to make sure the proper role is activated and meet the least privilege [4] in RBAC.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This decreases the whole system's risk. And then we introduce user trust and user trust threshold in role in order to make sure the proper role is activated and meet the least privilege [4] in RBAC.…”
Section: Introductionmentioning
confidence: 99%
“…Ref. [4] and [5] divide the risk system may cause into four matrices. They are role similar matrices, compliance to policy matrix, trust matrix and abuse and misuse matrix.…”
Section: Introductionmentioning
confidence: 99%