Login / Signup
Mining Attribute-Based Access Control Policies from Logs.
Zhongyuan Xu
Scott D. Stoller
Published in:
CoRR (2014)
Keyphrases
</>
access control policies
conflict resolution
access control
security policies
web logs
distributed environment
access control systems
extended logic programs
knowledge discovery
trust negotiation
data mining
supply chain
data mining techniques
information sharing
incomplete information