A method for access authorisation through delegation networks.
Audun JøsangDieter GollmannRichard AuPublished in: ACSW (2006)
Keyphrases
- cost function
- detection method
- high precision
- experimental evaluation
- dynamic programming
- high accuracy
- social networks
- preprocessing
- significant improvement
- feature set
- objective function
- synthetic data
- clustering method
- detection algorithm
- optimization algorithm
- theoretical analysis
- computational cost
- pairwise
- input data
- mutual information
- edge detection
- classification accuracy
- segmentation method
- computational complexity
- fully automatic
- optimization method