ABAC policy mining method based on hierarchical clustering and relationship extraction

S Shang, X Wang, A Liu - Computers & Security, 2024 - Elsevier
With the rapid development of information technology, the traditional access control model
has faced challenges in meeting the demands of practical applications. As a result, the …

Application of Deep Learning Models for Real-Time Automatic Malware Detection

R Gurierrez, W Villegas-Ch, LN Godoy… - IEEE …, 2024 - ieeexplore.ieee.org
The increase in the sophistication and volume of cyberattacks has made traditional malware
detection methods, such as those based on signatures and heuristics, obsolete. These …

The factors affecting environmental sustainability behaviour in the Malaysian hotel industry

CS Lim, SY Teoh, LS Kuar - IOP Conference Series: Earth and …, 2024 - iopscience.iop.org
Recently, environmental sustainability has become a critical topic in the 21st century.
Responsible tourism prioritises resource efficiency, community involvement, and …

Study on Credit Risk Control by Variational Inference

K Wang, A Li, X Wang, L Sun - International Conference on Web …, 2023 - Springer
This paper presents the development of an intelligent, machine learning-based Markov
chain model to investigate loan risk and strategies for controlling credit risk. The model …

Access Control Analysis in Heterogeneous Big Data Management Systems

MA Poltavtseva, MO Kalinin - Programming and Computer Software, 2024 - Springer
Big data management systems are in demand today in almost all industries, being also a
foundation for artificial intelligence training. The use of heterogeneous polystores in big data …

A Machine Learning for Role Based Access Control: Optimizing Role Management and Permission Management

S Arora, P Khare, S Gupta - 2024 First International Conference …, 2024 - ieeexplore.ieee.org
In this paper, introduce a novel machine learning (ML) approach to optimize role
management and permission control within Role-Based Access Control (RBAC) systems …

Unified Access Management for Digital Evidence Storage: Integrating Attribute-based and Role-based Access Control with XACML.

A Maulina, ZE Rasjid - International Journal of Advanced …, 2024 - search.ebscohost.com
Digital evidence is stored in digital evidence storage. An access control system is crucial in
situations where not all users can access digital evidence, ensuring that each user's access …

Анализ системы контроля доступа в гетерогенных системах больших данных

МА Полтавцева, МО Калинин - Труды Института …, 2024 - ispranproceedings.elpub.ru
Аннотация Системы управления большими данными являются сегодня
востребованными практически во всех отраслях, они же являются фундаментом для …