Cited By
View all- Mitra BSural SVaidya JAtluri V(2016)A Survey of Role MiningACM Computing Surveys10.1145/287114848:4(1-37)Online publication date: 22-Feb-2016
- Leitner MRinderle-Ma SOsborn STripunitara MMolloy I(2014)Anomaly detection and visualization in generative RBAC modelsProceedings of the 19th ACM symposium on Access control models and technologies10.1145/2613087.2613105(41-52)Online publication date: 25-Jun-2014
- Garrison WLee AHinrichs TOsborn STripunitara MMolloy I(2014)An actor-based, application-aware access control evaluation frameworkProceedings of the 19th ACM symposium on Access control models and technologies10.1145/2613087.2613099(199-210)Online publication date: 25-Jun-2014
- Show More Cited By