Cited By
View all- Zhu FYang CZhu LZuo HGu J(2024)MFC-RMA (Matrix Factorization and Constraints- Role Mining Algorithm): An Optimized Role Mining AlgorithmSymmetry10.3390/sym1608100816:8(1008)Online publication date: 7-Aug-2024
- Ma LYang ZBu ZLao QYang W(2023)Statement Recognition of Access Control Policies in IoT NetworksSensors10.3390/s2318793523:18(7935)Online publication date: 16-Sep-2023
- Shen ZGao NLiu ZLi MWang C(2021)Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control SystemScience of Cyber Security10.1007/978-3-030-89137-4_8(110-125)Online publication date: 10-Oct-2021
- Show More Cited By