On using Authorization Traces to Support Role Mining with Evolutionary Algorithms.
Simon AndererAlpay SahinBernd ScheuermannSanaz MostaghimPublished in: IJCCI (2022)
Keyphrases
- evolutionary algorithm
- access control
- evolutionary computation
- optimization problems
- differential evolution algorithm
- data mining
- genetic programming
- differential evolution
- role based access control
- data mining techniques
- web mining
- role assignment
- simulated annealing
- multi objective
- multi objective optimization
- conflict resolution
- evolution strategy
- data repositories