Sign in

Policy analysis for administrative role based access control without separate administration.

Ping YangMikhail I. GofmanScott D. StollerZijiang Yang
Published in: J. Comput. Secur. (2015)
Keyphrases
  • access control
  • data analysis
  • role based access control
  • data collection
  • anomaly detection
  • intrusion detection