Improving Logging to Reduce Permission Over-Granting Mistakes.
Bingyu ShenTianyi ShanYuanyuan ZhouPublished in: USENIX Security Symposium (2023)
Keyphrases
- role based access control
- real world
- data mining
- learning curve
- image processing
- third party
- evolutionary algorithm
- high level
- main memory databases
- access control
- artificial neural networks
- digital libraries
- image sequences
- database
- clustering algorithm
- web services
- website
- computer vision
- genetic algorithm
- data sets