Permission clustering-based attribute value optimization
In new large-scale computing environment, the attributes of entities were massive and they had complex sources and uneven quality, which were great obstacles to the application of ABAC (attribute-based access control).The attributes were also hard to be corrected manually, making it difficult to be...
Saved in:
| Main Authors: | Wenchao WU, Zhiyu REN, Xuehui DU |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2021-08-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021077 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
<span style="font-variant: small-caps">MedAccessX</span>: A Blockchain-Enabled Dynamic Access Control Framework for IoMT Networks
by: Guoyi Shi, et al.
Published: (2025-03-01) -
ABAC access control policy generation technique based on deep learning
by: Aodi LIU, et al.
Published: (2020-12-01) -
Unsupervised Attribute Reduction Algorithms for Multiset-Valued Data Based on Uncertainty Measurement
by: Xiaoyan Guo, et al.
Published: (2025-05-01) -
Soft discernibility matrix and attribute reduction for information systems
by: YAN De-qin1, et al.
Published: (2009-01-01) -
A Privacy Preserving Attribute-Based Access Control Model for the Tokenization of Mineral Resources via Blockchain
by: Padmini Nemala, et al.
Published: (2025-07-01)