[1] |
ZHANG D , RAMAMOHANARAO K , EBRINGER T ,et al. Permission set mining:discovering practical and useful roles[C]// The 24th Annual Computer Security Applications Conference. 2008: 247-256.
|
[2] |
YOUNIS Y A , KIFAYAT K , MERABTI M . An access control model for cloud computing[J]. Journal of Information Security and Applications, 2014,19(1): 45-60.
|
[3] |
李凤华, 王彦超, 殷丽华 ,等. 面向网络空间的访问控制模型[J]. 通信学报, 2016,37(5): 9-20.
|
|
LI F H , WANG Y C , YIN L H ,et al. Novel cyberspace-oriented access control model[J]. Journal on Communications, 2016,37(5): 9-20.
|
[4] |
YU X , XU P , ZHANG T ,et al. Research and implementation of role-based access control model of fundamental spatial database system of Jilin water resources[C]// The 2013 International Conference on Information System and Engineering Management. 2013: 83-86.
|
[5] |
WANG Y C , LI F H , XIONG J B ,et al. Achieving lightweight and secure access control in multi-authority cloud[C]// The 14th IEEE International Conference on Trust,Security and Privacy in Computing and Communications. 2015: 459-466.
|
[6] |
VAIDYA J , ATLURI V , GUO Q . The role mining problem:a formal perspective[J]. ACM Transactions on Information and System Security, 2010,13(3).
|
[7] |
MOLLOY I , LI N.H , QI A ,et al. Mining roles with noisy data[C]// The 15th ACM Symposium on Access Control Models and Technologies. 2010: 45-54.
|
[8] |
BAUER L , GARRISS S , REITER M.K . Detecting and resolving policy misconfigurations in access-control systems[J]. ACM Transactions on Information and System Security, 2011,14(1).
|
[9] |
DAS T , BHAGWAN R , NALDURG P . Baaz:a system for detecting access control misconfigurations[C]// The 19th USENIX Security Symposium. 2010: 161-176.
|
[10] |
SCHLEGELMILCH J , STEFFENS U . Role mining with Oracle[C]// The 10th ACM Symposium on Access Control Models and Technologies. 2005: 168-176.
|
[11] |
VAIDYA J , ATLURI V , WARNER J . Roleminer:mining roles using subset enumeration[C]// The 13th ACM Conference on Computer and Communications Security. 2006: 144-153.
|
[12] |
MOLLOY I , CHEN H , LI T et al . Mining roles with semantic meanings[C]// The 13th ACM Symposium on Access Control Models and Technologies. 2008: 21-30.
|
[13] |
FRANK M , BUHMAN J M , BASIN D . Role mining with probabilistic model[J]. ACM Transactions on Information and System Security, 2013,15(4).
|
[14] |
HARIKA P , NAGAJYOTHI M , JOHN J C ,et al. Meeting cardinality constraints in role mining[J]. IEEE Transactions on Dependable and Secure Computing, 2015,12(1): 71-84.
|
[15] |
JAFARIAN J H , TAKABI H , TOUATI H ,et al. Towards a general framework for optimal role mining:a constraint satisfaction approach[C]// The 20th ACM Symposium on Access Control Models and Technologies. 2015: 211-220.
|
[16] |
LUXBURG U V . A tutorial on spectral clustering[J]. Statistics and Computing, 2007,17(4): 395-416.
|
[17] |
ZELNIK-MANOR L . Self-tuning spectral clustering[J]. Advances in Neural Information Processing Systems, 2004,14: 1601-1608.
|
[18] |
YAN J , CHENG D , ZONG M ,et al. Improved spectral clustering algorithm based on similarity measure[C]// The 10th International Conference on Advanced Data Mining and Applications. 2014: 641-654.
|
[19] |
GHOSHDASTIDAR D , DUKKIPATI A . Spectral clustering using multilinear svd:Analysis,approximations and applications[C]// The 29th Conference on Artificial Intelligence. 2015: 2610-2616.
|
[20] |
LU H , FU Z , SHU X . Non-negative and sparse spectral clustering[J]. Pattern Recognition, 2014,47(1): 418-426.
|
[21] |
孔万增, 孙志海, 杨灿 ,等. 基于本征间隙与正交特征向量的自动谱聚类[J]. 电子学报, 2010,38(8): 1880-1885.
|
|
KONG W Z , SUN Z H , YANG C ,et al. Automatic spectral clustering based on eigengap and orthogonal eigenvector[J]. Acta Electronica Sinica, 2010,38(8): 1880-1885.
|
[22] |
STOLLER S D , YANG P , RAMAKRISHNAN C R ,et al. Efficient policy analysis for administrative role based access control[C]// The 2007 ACM Conference on Computer and Communications Security. 2007: 445-455.
|
[23] |
ENE A , HORNE W , MILOSAVLJEVIC N ,et al. Fast exact and heuristic methods for role minimization problems[C]// The 13th ACM Symposium on Access Control Models and Technologies. 2008: 1-10.
|
[24] |
YIN L , FANG L , NIU B ,et al. Hunting abnormal configurations for permission-sensitive role mining[C]// The 2016 IEEE Military Communications Conference. 2016: 1004-1009.
|