ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
1
views
0
references
Top references
cited by
1
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,668
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Handling least privilege problem and role mining in RBAC
Author(s):
Hejiao Huang
,
Feng Shang
,
Jinling Liu
,
Hongwei Du
Publication date:
2015
Journal:
J Comb Optim
Read this article at
ScienceOpen
Publisher
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Big Data Privacy
Author and article information
Journal
DOI::
10.1007/s10878-013-9633-9
ScienceOpen disciplines:
Computer science
,
Security & Cryptology
Data availability:
ScienceOpen disciplines:
Computer science
,
Security & Cryptology
Comments
Comment on this article
Sign in to comment
scite_
Similar content
4,668
RBAC Extension Model for ERP Systems in Multidomain Environments
Authors:
O. Gomez-Baryolo
,
V. Estrada-Senti
,
M. S. Lazo-Cortes
…
Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration
Authors:
Chang-Joo Moon
,
Dae-Ha Park
,
Soung-Jin Park
…
Managing Risks in RBAC Employed Distributed Environments
Authors:
Ebru Celikel
,
Murat KANTARCIOGLU
,
Bhavani Thuraisingham
…
See all similar
Cited by
1
The Equivalent Conversions of the Role-Based Access Control Model
Authors:
N. F. Bogachenko
See all cited by