Hunting abnormal configurations for permission-sensitive role mining.
Lihua YinLiang FangBen NiuBinxing FangFenghua LiPublished in: MILCOM (2016)
Keyphrases
- role based access control
- data mining
- access control
- knowledge discovery
- association rule mining
- third party
- pattern mining
- mining algorithm
- transactional data
- text mining
- software repositories
- sequential patterns
- abnormal patterns
- association mining
- sequential pattern mining
- web mining
- frequent patterns
- case study
- computer vision
- machine learning