Verification and change-impact analysis of access-control policies, Proc. 27th International Conference on Software Engineering, pp.196-205, 2005. ,
Automated verification of access control policies, 2004. ,
The Ponder Policy Specification Language, Proc. International Workshop on Policies for Distributed Systems and Networks, pp.18-38, 2001. ,
DOI : 10.1007/3-540-44569-2_2
Assessing Quality of Policy Properties in Verification of Access Control Policies, 2008 Annual Computer Security Applications Conference (ACSAC), pp.163-172, 2008. ,
DOI : 10.1109/ACSAC.2008.48
Fast algorithms for mining association rules in large databases, Proc. 20th International Conference on Very Large Data Bases, pp.487-499, 1994. ,
Detecting and resolving policy misconfigurations in access-control systems, Proc. 13th ACM Symposium on Access control Models and Technologies, pp.185-194, 2008. ,
Inferring Access-Control Policy Properties via Machine Learning, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06), pp.235-238, 2006. ,
DOI : 10.1109/POLICY.2006.19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.6815
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001. ,
DOI : 10.1145/501978.501980
Apriori -Association Rule Induction/Frequent Item Set Mining, 2009. ,
A fault model and mutation testing of access control policies, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.667-676, 2007. ,
DOI : 10.1145/1242572.1242663
Efficient policy analysis for administrative role based access control, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.445-455, 2007. ,
DOI : 10.1145/1315245.1315300