Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I | 0 | 0.34 | 2022 |
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain | 0 | 0.34 | 2022 |
Analyzing social media messages of public sector organizations utilizing sentiment analysis and topic modeling | 0 | 0.34 | 2021 |
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization | 1 | 0.35 | 2020 |
Security, Privacy and Trust for Responsible Innovations and Governance. | 0 | 0.34 | 2020 |
Policy Adaptation in Hierarchical Attribute-based Access Control Systems | 1 | 0.37 | 2019 |
Deploying ABAC policies using RBAC systems. | 1 | 0.43 | 2019 |
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC | 0 | 0.34 | 2019 |
ABACaaS - Attribute-Based Access Control as a Service. | 0 | 0.34 | 2019 |
Towards designing robust CAPTCHAs. | 0 | 0.34 | 2018 |
Policy Engineering in RBAC and ABAC. | 1 | 0.37 | 2018 |
Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes. | 0 | 0.34 | 2018 |
Efficient Bottom-Up Mining of Attribute Based Access Control Policies | 2 | 0.40 | 2017 |
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration | 0 | 0.34 | 2017 |
Migrating from RBAC to temporal RBAC. | 2 | 0.38 | 2017 |
Efficient Evaluation of Authorizations for Video Data. | 0 | 0.34 | 2016 |
Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing. | 1 | 0.36 | 2015 |
Security analysis for temporal role based access control | 0 | 0.34 | 2014 |
An optimization framework for role mining | 5 | 0.40 | 2014 |
Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings | 0 | 0.34 | 2014 |
Utilizing social media to improve local government responsiveness | 4 | 0.40 | 2014 |
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management. | 2 | 0.37 | 2013 |
An Administrative Model for Spatio-Temporal Role Based Access Control. | 4 | 0.41 | 2013 |
AMTRAC: An administrative model for temporal role-based access control | 7 | 0.51 | 2013 |
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition | 29 | 0.88 | 2012 |
Using QR codes for enhancing the scope of digital government services | 3 | 0.43 | 2012 |
Attacking Image Based CAPTCHAs Using Image Recognition Techniques. | 3 | 0.42 | 2012 |
Role Mining Under Role-Usage Cardinality Constraint | 12 | 0.53 | 2012 |
Privacy-preserving subgraph discovery | 2 | 0.37 | 2012 |
UICDS-based information sharing among emergency response application systems | 5 | 0.46 | 2011 |
Security analysis of GTRBAC and its variants using model checking | 4 | 0.41 | 2011 |
Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings | 37 | 1.85 | 2011 |
Role mining in the presence of noise | 7 | 0.46 | 2010 |
Semantics-aware security policy specification for the semantic web data. | 3 | 0.48 | 2010 |
Privacy-preserving trust verification | 0 | 0.34 | 2010 |
The role mining problem: A formal perspective | 31 | 1.13 | 2010 |
Anonymization models for directional location based service environments | 5 | 0.44 | 2010 |
Evaluating the validity of data instances against ontology evolution over the Semantic Web | 18 | 0.89 | 2009 |
Edge-RMP: Minimizing administrative assignments for role-based access control | 14 | 0.71 | 2009 |
An efficient online auditing approach to limit private data disclosure | 1 | 0.35 | 2009 |
Spatiotemporal Access Control Enforcement under Uncertain Location Estimates | 7 | 0.51 | 2009 |
Secure information sharing and analysis for effective emergency management | 10 | 0.52 | 2008 |
Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings | 22 | 2.16 | 2008 |
Optimal Boolean Matrix Decomposition: Application to Role Engineering | 91 | 3.24 | 2008 |
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007 | 14 | 1.48 | 2007 |
Efficient security policy enforcement in a location based service environment | 13 | 0.70 | 2007 |
Semantic feature selection for object discovery in high-resolution remote sensing imagery | 1 | 0.37 | 2007 |
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 | 11 | 3.42 | 2007 |
The role mining problem: finding a minimal descriptive set of roles | 160 | 6.03 | 2007 |
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 | 10 | 1.53 | 2007 |