Login / Signup

An Automatic Attribute-Based Access Control Policy Extraction From Access Logs.

Leila KarimiMaryam AldairiJames JoshiMai Abdelhakim
Published in: IEEE Trans. Dependable Secur. Comput. (2022)
Keyphrases
  • access logs
  • access control policies
  • access control
  • access patterns
  • conflict resolution
  • web users
  • security policies
  • databases
  • information extraction
  • web server
  • search engine
  • web documents
  • fine grained