From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Clustering-based Approach for Anomaly Detection in XACML Policies., , , , и . SECRYPT, стр. 548-553. SciTePress, (2017)A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies., , , и . SoCPaR, том 1383 из Advances in Intelligent Systems and Computing, стр. 836-846. Springer, (2020)Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies., , , и . IBICA, том 735 из Advances in Intelligent Systems and Computing, стр. 298-308. Springer, (2017)Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis., , , и . NETYS, том 11704 из Lecture Notes in Computer Science, стр. 250-266. Springer, (2019)Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies., , , и . EAI Endorsed Trans. Security Safety, 5 (16): e3 (2018)Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach., , , и . IEEE BigData, стр. 5330-5332. IEEE, (2018)