Role-Based Access Control Models
Computer
Assessing modular structure of legacy code based on mathematical concept analysis
ICSE '97 Proceedings of the 19th international conference on Software engineering
Formal Concept Analysis: Mathematical Foundations
Formal Concept Analysis: Mathematical Foundations
Concept Data Analysis: Theory and Applications
Concept Data Analysis: Theory and Applications
Towards "WYDIWYS" for MIMI using concept analysis
Proceedings of the 2009 ACM symposium on Applied Computing
Formal concept analysis in information science
Annual Review of Information Science and Technology
Hi-index | 0.00 |
We demonstrate how one can use the formal concept analysis (FCA) to obtain the role hierarchy for the role based access control from the existing access control matrix. We also discuss assesed by means of FCA the quality of security system and finding users with excess permissions.