Login / Signup
An Automatic Attribute-Based Access Control Policy Extraction From Access Logs.
Leila Karimi
Maryam Aldairi
James Joshi
Mai Abdelhakim
Published in:
IEEE Trans. Dependable Secur. Comput. (2022)
Keyphrases
</>
access logs
access control policies
access control
access patterns
conflict resolution
web users
security policies
databases
information extraction
web server
search engine
web documents
fine grained