Greedy and evolutionary algorithms for mining relationship-based access control policies T Bui, SD Stoller, J Li Computers & Security 80, 317-333, 2019 | 33 | 2019 |
Mining hierarchical temporal roles with multiple metrics SD Stoller, T Bui Journal of Computer Security 26 (1), 121-142, 2018 | 27 | 2018 |
Mining relationship-based access control policies T Bui, SD Stoller, J Li Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017 | 23 | 2017 |
Efficient and Extensible Policy Mining for Relationship-Based Access Control T Bui, SD Stoller, H Le Proceedings of the 24th ACM on Symposium on Access Control Models and …, 2019 | 21 | 2019 |
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies T Bui, SD Stoller Proceedings of the 25th ACM on Symposium on Access Control Models and …, 2020 | 19 | 2020 |
Learning attribute-based and relationship-based access control policies with unknown values T Bui, SD Stoller International Conference on Information Systems Security, 23-44, 2020 | 15 | 2020 |
Mining relationship-based access control policies from incomplete and noisy data T Bui, SD Stoller, J Li International Symposium on Foundations and Practice of Security, 267-284, 2018 | 14 | 2018 |
Fast distributed evaluation of stateful attribute-based access control policies T Bui, SD Stoller, S Sharma IFIP Annual Conference on Data and Applications Security and Privacy, 101-119, 2017 | 5 | 2017 |