Login / Signup
Mining Attribute-Based Access Control Policies from Logs.
Zhongyuan Xu
Scott D. Stoller
Published in:
DBSec (2014)
Keyphrases
</>
access control policies
access control
conflict resolution
distributed environment
web logs
security policies
trust negotiation
data mining
access control systems
database
knowledge discovery
security issues
security requirements
intelligent systems
security mechanisms
extended logic programs