Greedy and evolutionary algorithms for mining relationship-based access control policies T Bui, SD Stoller, J Li Computers & Security 80, 317-333, 2019 | 38 | 2019 |
Mining hierarchical temporal roles with multiple metrics SD Stoller, T Bui Journal of Computer Security 26 (1), 121-142, 2018 | 27 | 2018 |
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies T Bui, SD Stoller Proceedings of the 25th ACM on Symposium on Access Control Models and …, 2020 | 24 | 2020 |
Mining relationship-based access control policies T Bui, SD Stoller, J Li Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017 | 23 | 2017 |
Efficient and Extensible Policy Mining for Relationship-Based Access Control T Bui, SD Stoller, H Le Proceedings of the 24th ACM on Symposium on Access Control Models and …, 2019 | 22 | 2019 |
Learning attribute-based and relationship-based access control policies with unknown values T Bui, SD Stoller International Conference on Information Systems Security, 23-44, 2020 | 15 | 2020 |
Mining relationship-based access control policies from incomplete and noisy data T Bui, SD Stoller, J Li International Symposium on Foundations and Practice of Security, 267-284, 2018 | 14 | 2018 |
Vsec: Transformer-based model for vietnamese spelling correction DT Do, HT Nguyen, TN Bui, HD Vo PRICAI 2021: Trends in Artificial Intelligence: 18th Pacific Rim …, 2021 | 12 | 2021 |
Fast distributed evaluation of stateful attribute-based access control policies T Bui, SD Stoller, S Sharma IFIP Annual Conference on Data and Applications Security and Privacy, 101-119, 2017 | 5 | 2017 |
Greedy and Evolutionary Algorithms for Mining Relationship-Based Access Control Policies T Bui, SD Stoller, J Li arXiv preprint arXiv:1708.04749, 2017 | 1 | 2017 |