Login / Signup
Attribute-Based Access Control Policy Generation Approach from Access Logs Based on the CatBoost.
Shan Quan
Yongdan Zhao
Nurmamat Helil
Published in:
Comput. Informatics (2023)
Keyphrases
</>
access logs
access control policies
access control
access patterns
conflict resolution
website
security policies
search engine
distributed environment
web users
fine grained
usage patterns
databases
web mining
web server
social networks