Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies.
Dianxiang XuNing ShenYunpeng ZhangPublished in: Int. J. Softw. Eng. Knowl. Eng. (2015)
Keyphrases
- access control
- computational cost
- times faster
- orders of magnitude
- recently developed
- data sets
- combinatorial optimization
- computationally expensive
- theoretical analysis
- significant improvement
- computational complexity
- learning algorithm
- real time
- np hard
- computationally efficient
- data structure
- neural network
- access control policies