Author of the publication

Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis.

, , , and . NETYS, volume 11704 of Lecture Notes in Computer Science, page 250-266. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies., , , and . IBICA, volume 735 of Advances in Intelligent Systems and Computing, page 298-308. Springer, (2017)Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach., , , and . IEEE BigData, page 5330-5332. IEEE, (2018)Clustering-based Approach for Anomaly Detection in XACML Policies., , , , and . SECRYPT, page 548-553. SciTePress, (2017)A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies., , , and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 836-846. Springer, (2020)Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis., , , and . NETYS, volume 11704 of Lecture Notes in Computer Science, page 250-266. Springer, (2019)