Cited By
View all- Zhu FYang CZhu LZuo HGu J(2024)MFC-RMA (Matrix Factorization and Constraints- Role Mining Algorithm): An Optimized Role Mining AlgorithmSymmetry10.3390/sym1608100816:8(1008)Online publication date: 7-Aug-2024
- Jayasundara SGamagedara Arachchilage NRussello G(2024)SoK: Access Control Policy Generation from High-level Natural Language RequirementsACM Computing Surveys10.1145/370605757:4(1-37)Online publication date: 28-Nov-2024
- Ma LYang ZBu ZLao QYang W(2023)Statement Recognition of Access Control Policies in IoT NetworksSensors10.3390/s2318793523:18(7935)Online publication date: 16-Sep-2023
- Show More Cited By