Login / Signup
An Automatic Attribute Based Access Control Policy Extraction from Access Logs.
Leila Karimi
Maryam Aldairi
James Joshi
Mai Abdelhakim
Published in:
CoRR (2020)
Keyphrases
</>
access logs
access control policies
access control
search engine
access patterns
usage patterns
distributed environment
web services
multi agent
fine grained
business process
user behavior
security policies