نتایج جستجو برای: mining policy
تعداد نتایج: 346383 فیلتر نتایج به سال:
We study the problem of inferring policy intent to identify misconfigurations in access control implementations. This is in contrast to traditional role-mining techniques, which focus on creating better abstractions for access control management. We show how raw metadata can be summarized effectively, by grouping together users with similar permissions over shared resources. Using these summary...
The combination of Data warehousing and data analysis techniques such as OLAP (Online Analytic Processing) and data mining through the Hadoop framework is an innovative way to treat large volumes of data. However, this way poses serious scheduling and combining tasks issues that bring more challenges. In this paper, we propose strategies to answer these questions, namely parallel OLAM (Online A...
Access control policies and models guide the successful implementation of well-defined access control requirements, which are used for the protection of information or data objects in an information system environment. Whenever these objects are used in a data mining environment, a change in the access control requirements is needed. During a data mining activity, the data miner may expose unex...
Usage of social media are increased considerably in today world it enables the user to share images with one another. Sharing the images may leads to performance violation. Web mining is use of data mining technique to discover and extract the information from the web. Web content mining is the extraction and integration of data, information and knowledge from web page. In the web, one can mine...
A framework supporting the privacy policy life cycle helps guide the kind of research to consider before sound privacy answers may be realized. nformation technology advances are making Internet and Web-based system use the common choice in many application domains, ranging from business to health care to scientific collaboration and distance learning. However, adoption is slowed by well-founde...
Temporal role-based access control (TRBAC) extends rolebased access control to limit the times at which roles are enabled. This paper presents a new algorithm for mining high-quality TRBAC policies from timed ACLs (i.e., ACLs with time limits in the entries) and optionally user attribute information. Such algorithms have potential to significantly reduce the cost of migration from timed ACLs to...
Draft Background The aim of this paper is to present an outline for discussion upon a new Research Challenge on Opinion Mining and Sentiment Analysis. This research challenge has been developed in the scope of project CROSSOVER “Bridging Communities for Next Generation Policy-Making” in the view of the definition of a new Research Roadmap on ICT Tools for Governance and Policy Making, building ...
Managing the security of complex cloud and networked computing environments requires crafting security policy—ranging from natural-language text to highly-structured configuration rules, sometimes multi-layered—specifying correct system behavior in an adversarial environment. Since environments change and evolve, managing security requires managing evolution of policies, which adds another laye...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید