Login / Signup

Generative models for access control policies: applications to role mining over logs with attribution.

Ian M. MolloyYoungja ParkSuresh Chari
Published in: SACMAT (2012)
Keyphrases