×
Abstract: Mining approaches, such as role mining or organizational mining, can be applied to derive permissions and roles from a system's configuration or ...
In this paper, we present a systematic approach to migrate current-state RBAC models to target-state RBAC models. In particular, we use model comparison ...
In this paper, we present a systematic approach to migrate current-state RBAC models to target-state RBAC models.
This paper uses model comparison techniques to identify differences between two RBAC models and derives migration rules that define which elements and ...
To derive a migration guide, this paper does not aim to determine the similarity of two models but to reveal the ele- ments that differ between two RBAC models.
In this paper, we present a systematic approach to migrate current-state RBAC models to target-state RBAC models. In particular, we use model comparison ...
May 1, 2013 · In this paper, we present a systematic approach to migrate current-state RBAC models to target-state RBAC models. In particular, we use model ...
In this paper, we present a systematic approach to migrate current-state RBAC models to target-state RBAC models. In particular, we use model comparison ...
A collection of security conferences and talks since 1969 ... An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides.
Bridging the gap between role mining and role engineering via migration guides. A Baumgrass, M Strembeck. Information Security Technical Report, 2013. 18, 2013.