Sciweavers

507 search results - page 2 / 102
» A simple role mining algorithm
Sort
View
SACMAT
2010
ACM
13 years 3 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
CEC
2007
IEEE
13 years 11 months ago
A simple genetic algorithm for music generation by means of algorithmic information theory
— Recent large scale experiments have shown that the Normalized Information Distance, an algorithmic information measure, is among the best similarity metrics for melody classiï¬...
Manuel Alfonseca, Manuel Cebrián, Alfonso O...
KDD
2003
ACM
156views Data Mining» more  KDD 2003»
14 years 5 months ago
Mining distance-based outliers in near linear time with randomization and a simple pruning rule
Defining outliers by their distance to neighboring examples is a popular approach to finding unusual examples in a data set. Recently, much work has been conducted with the goal o...
Stephen D. Bay, Mark Schwabacher
SACMAT
2005
ACM
13 years 10 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
COMPSEC
2010
122views more  COMPSEC 2010»
13 years 3 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...