Login / Signup
Let the Right One in: Discovering and Mitigating Permission Gaps.
Beng Heng Ng
Atul Prakash
Published in:
ICISS (2013)
Keyphrases
</>
third party
management system
access control
risk management
information systems
databases
bayesian networks
multi relational
role based access control
decision trees
support vector
digital libraries
evolutionary algorithm
security policies
automatically extracting