Permission clustering-based attribute value optimization
In new large-scale computing environment, the attributes of entities were massive and they had complex sources and uneven quality, which were great obstacles to the application of ABAC (attribute-based access control).The attributes were also hard to be corrected manually, making it difficult to be...
Saved in:
Main Authors: | Wenchao WU, Zhiyu REN, Xuehui DU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2021-08-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021077 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
ABAC access control policy generation technique based on deep learning
by: Aodi LIU, et al.
Published: (2020-12-01) -
Soft discernibility matrix and attribute reduction for information systems
by: YAN De-qin1, et al.
Published: (2009-01-01) -
Model for attribute based access control
by: LI Xiao-feng1~4, et al.
Published: (2008-01-01) -
Enhanced cloud storage access control scheme based on attribute
by: De-hua NIU, et al.
Published: (2013-08-01) -
Rough sets theory and its extensions for attribute reduction: a review
by: Sadegh Eskandari
Published: (2021-06-01)