Greedy and evolutionary algorithms for mining relationship-based access control policies.
Thang BuiScott D. StollerJiajie LiPublished in: Comput. Secur. (2019)
Keyphrases
- evolutionary algorithm
- evolutionary computation
- multi objective
- optimization problems
- greedy algorithm
- differential evolution
- data mining
- genetic programming
- differential evolution algorithm
- fitness function
- association rule mining
- text mining
- genetic algorithm
- search algorithm
- knowledge discovery
- itemsets
- mining algorithm
- pattern mining
- web mining
- multi objective optimization
- sequential patterns
- simulated annealing
- data mining algorithms
- locally optimal
- dynamic programming
- data sets
- evolutionary strategy
- greedy heuristic
- greedy algorithms
- evolution strategy
- optimal policy
- data mining techniques
- data streams
- neural network