Proceedings of the 13th ACM Symposium on Access Control Models and Technologies 2008
DOI: 10.1145/1377836.1377840
|View full text |Cite
|
Sign up to set email alerts
|

Mining roles with semantic meanings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
148
0
5

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 144 publications
(160 citation statements)
references
References 9 publications
0
148
0
5
Order By: Relevance
“…Several approaches are able to take existing roles into consideration (e.g. (Molloy et al, 2008)) but do not integrate usage data. Moreover, restrictions on the hierarchy of a RBAC state can represent one way to reduce complexity and increase the quality of either a single role or the whole RBAC state.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Several approaches are able to take existing roles into consideration (e.g. (Molloy et al, 2008)) but do not integrate usage data. Moreover, restrictions on the hierarchy of a RBAC state can represent one way to reduce complexity and increase the quality of either a single role or the whole RBAC state.…”
Section: Discussionmentioning
confidence: 99%
“…Finally, papers that do not present role mining techniques were removed from the catalog (e.g. (Molloy et al, 2008)). Consecutively, we classify recent role mining publications according to the scheme presented by (Fuchs and Meier, 2011).…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations