• Aucun résultat trouvé

18 résultats avec le mot-clé: 'mining attribute based access control policies from logs'

Mining Attribute-Based Access Control Policies from Logs

For example, for case studies with manually written attribute data, when the actual log completeness is 80%, and the estimated completeness used to compute w o varies from 70% to

Protected

N/A

17
0
0
2021
Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems

Given dynamic groups implementing user- attribute policies to resources and administrative units policies, we first model the user attribute-based access control system as a

Protected

N/A

13
0
0
2021
Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies

Details of the policy language are abstracted behind an interface containing a single function evaluateRequest(policy,request) that returns an EvalResult ob- ject with these

Protected

N/A

20
0
0
2021
Devoir maison N°5 : Drôle d’escargot 4

Au centre d’une feuille blanche, tracer, le plus précisément possible, un triangle SAB rectangle en A dont les côtés de l’angle droit mesurent 1 cm?. Combien mesure alors

Protected

N/A

1
0
0
2022
Programme de la journée

Dans le cadre du réseau régional « PACA Climat », la Région Provence-Alpes-Côte d'Azur, l'ADEME, la DREAL et le FEDER sont associés pour accompagner les territoires en démarche

Protected

N/A

2
0
0
2022
Dossier de Presse. EZ3KIEL Jako Maron

L'identité musicale d'EZ3kiel s'est forgée avec le temps : au commencement le groupe était composé de 5 membres (basse, batterie, 2 guitares et une chanteuse) et était très

Protected

N/A

8
0
0
2022
Efficient Attribute Based Access Control for RESTful Services

The results are faster processing times for access requests and an easy to manage concept for security policies for RESTful services..

Protected

N/A

8
0
0
2022
Télécharger l’ensemble des diaporamas présentés au cours de la journée

Table ronde : Comment intégrer les énergies renouvelables dans les démarches PCET?. Présentation des ateliers de l’après-midi Pause déjeuner (plateaux repas servis

Protected

N/A

41
0
0
2022
Enhancing context data distribution for the internet of things using qoc-awareness and attribute-based access control

This article extends our previous work dealing with QoC-aware con- text contracts [ 19 ] and proposes to define attribute-based access control policies for delivering context data

Protected

N/A

13
0
0
2021
Fast Semantic Attribute-Role-Based Access Control (ARBAC)

We used a modified Attribute-Role-Based Access Control (ARBAC) security model and an OWL ontology with additional rules in a logic programming framework to express

Protected

N/A

8
0
0
2022
EXTRAIT DES REGISTRES DES DELIBERATIONS DU BUREAU DE LA METROPOLE AIX-MARSEILLE-PROVENCE

 Approbation de la convention d'occupation du domaine public et d'entretien pour la mise en place et le fonctionnement d'une borne escamotable, Place Montmorin sur la commune

Protected

N/A

3
0
0
2022
Mining Likely Properties of Access Control Policies via Association Rule Mining

We have developed an approach that analyzes a policy under verification and mines likely properties based on implication relations of subject, action, and subject-action attributes

Protected

N/A

17
0
0
2021
Anti-inflammatory and chondroprotective effects of the S-adenosylhomocysteine hydrolase inhibitor 3-Deazaneplanocin A, in human articular chondrocytes

Interestingly, we showed, in an in vitro model of inflammatory joint diseases, that DZNep reduces the activa- tion of MAPK pathways (p38 and JNK), decreases the production

Protected

N/A

10
0
0
2021
The DART-Europe E-theses Portal

Keywords: Web usage mining (WUM), Web mining, data mining, Web access logs, WUM methodology, WUM preprocessing, intersites WUM, sequential pattern mining, low support,

Protected

N/A

169
0
0
2022
Web Usage Mining: Contributions to Intersites Logs Preprocessing and Sequential Pattern Extraction with Low Support

Keywords: Web usage mining (WUM), Web mining, data mining, Web access logs, WUM methodology, WUM preprocessing, intersites WUM, sequential pattern mining, low support,

Protected

N/A

169
0
0
2021
Model-Based Tests for Access Control Policies

implements test targets instantiated test targets application− specific roles, perms, contexts generated from generated from test cases policy PDP application logic generated

Protected

N/A

11
0
0
2021
Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT System

With the concept of proactive scenario, we showed how to provide data coming from the sensors as a source of attributes for the ABAC model. More- over, in these scenarios, the data

Protected

N/A

8
0
0
2021

Télécharger plus de documents et télécharger des études de documentation immédiatement !