Role mining based on permission cardinality constraint and user cardinality constraint

Publisher: John Wiley & Sons Inc

E-ISSN: 1939-0122|8|13|2317-2328

ISSN: 1939-0114

Source: SECURITY AND COMMUNICATION NETWORKS (ELECTRONIC), Vol.8, Iss.13, 2015-09, pp. : 2317-2328

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract