Methods and tools for policy analysis

AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …

Recent developments in boolean matrix factorization

P Miettinen, S Neumann - arXiv preprint arXiv:2012.03127, 2020 - arxiv.org
The goal of Boolean Matrix Factorization (BMF) is to approximate a given binary matrix as
the product of two low-rank binary factor matrices, where the product of the factor matrices is …

[图书][B] Data analytics for cybersecurity

VP Janeja - 2022 - books.google.com
As the world becomes increasingly connected, it is also more exposed to a myriad of cyber
threats. We need to use multiple types of tools and techniques to learn and understand the …

Exploiting multi-grain ranking constraints for precisely searching visually-similar vehicles

K Yan, Y Tian, Y Wang, W Zeng… - Proceedings of the …, 2017 - openaccess.thecvf.com
Precise search of visually-similar vehicles poses a great challenge in computer vision, which
needs to find exactly the same vehicle among a massive vehicles with visually similar …

Finding permission bugs in smart contracts with role mining

Y Liu, Y Li, SW Lin, C Artho - Proceedings of the 31st ACM SIGSOFT …, 2022 - dl.acm.org
Smart contracts deployed on permissionless blockchains, such as Ethereum, are accessible
to any user in a trustless environment. Therefore, most smart contract applications …

Discovery of optimal factors in binary data via a novel method of matrix decomposition

R Belohlavek, V Vychodil - Journal of Computer and System Sciences, 2010 - Elsevier
We present a novel method of decomposition of an n× m binary matrix I into a Boolean
product A○ B of an n× k binary matrix A and ak× m binary matrix B with k as small as …

The discrete basis problem

P Miettinen, T Mielikäinen, A Gionis… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
Matrix decomposition methods represent a data matrix as a product of two factor matrices:
one containing basis vectors that represent meaningful concepts in the data, and another …

Fast exact and heuristic methods for role minimization problems

A Ene, W Horne, N Milosavljevic, P Rao… - Proceedings of the 13th …, 2008 - dl.acm.org
We describe several new bottom-up approaches to problems in role engineering for Role-
Based Access Control (RBAC). The salient problems are all NP-complete, even to …

Mining roles with semantic meanings

I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino… - Proceedings of the 13th …, 2008 - dl.acm.org
With the growing adoption of role-based access control (RBAC) in commercial security and
identity management products, how to facilitate the process of migrating a non-RBAC system …

An automatic attribute-based access control policy extraction from access logs

L Karimi, M Aldairi, J Joshi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the rapid advances in computing and information technologies, traditional access
control models have become inadequate in terms of capturing fine-grained, and expressive …