Cited By
View all- Shen BShan TZhou YCalandrino JTroncoso C(2023)MultiviewProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620657(7499-7516)Online publication date: 9-Aug-2023
- Kern SBaumer TFuchs LPernul G(2023)Maintain High-Quality Access Control Policies: An Academic and Practice-Driven ApproachData and Applications Security and Privacy XXXVII10.1007/978-3-031-37586-6_14(223-242)Online publication date: 12-Jul-2023
- Sahani GThaker CShah S(2022)Supervised Learning-Based Approach Mining ABAC Rules from Existing RBAC Enabled SystemsICST Transactions on Scalable Information Systems10.4108/eetsis.v5i16.1560(e3)Online publication date: 7-Sep-2022
- Show More Cited By