Sciweavers

Share
ACSAC   2008 Annual Computer Security Applications Conference
Wall of Fame | Most Viewed ACSAC-2008 Paper
ACSAC
2008
IEEE
9 years 4 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source188
2Download preprint from source184
3Download preprint from source178
4Download preprint from source172
5Download preprint from source163
6Download preprint from source150
7Download preprint from source138
8Download preprint from source136
9Download preprint from source132
10Download preprint from source131
11Download preprint from source130
12Download preprint from source126
13Download preprint from source125
14Download preprint from source124
15Download preprint from source123
16Download preprint from source121
17Download preprint from source119
18Download preprint from source119
19Download preprint from source119
20Download preprint from source117
21Download preprint from source116
22Download preprint from source110
23Download preprint from source108
24Download preprint from source108
25Download preprint from source103
26Download preprint from source90
27Download preprint from source88
28Download preprint from source79
29Download preprint from source77
30Download preprint from source61
books