Sign in

Greedy and evolutionary algorithms for mining relationship-based access control policies.

Thang BuiScott D. StollerJiajie Li
Published in: Comput. Secur. (2019)
Keyphrases