Permission clustering-based attribute value optimization

In new large-scale computing environment, the attributes of entities were massive and they had complex sources and uneven quality, which were great obstacles to the application of ABAC (attribute-based access control).The attributes were also hard to be corrected manually, making it difficult to be...

Full description

Saved in:
Bibliographic Details
Main Authors: Wenchao WU, Zhiyu REN, Xuehui DU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-08-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021077
Tags: Add Tag
No Tags, Be the first to tag this record!