Cited By
View all- Liu YLi YLin SArtho CRyu SSmaragdakis Y(2022)Finding permission bugs in smart contracts with role miningProceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3533767.3534372(716-727)Online publication date: 18-Jul-2022
- Kern SBaumer TGroll SFuchs LPernul G(2022)Optimization of Access Control PoliciesJournal of Information Security and Applications10.1016/j.jisa.2022.10330170:COnline publication date: 1-Nov-2022
- Trnecka MTrneckova M(2020)An Incremental Algorithm for the Role Mining ProblemComputers & Security10.1016/j.cose.2020.101830(101830)Online publication date: Apr-2020
- Show More Cited By