In Multiple Criteria Decision Analysis, the preferences of the decision maker regarding each criterion are classically modelled by a utility function depending on one single varia...
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
Controlling access to resources is one of the most important protection goals for web-based services in practice. In general, access control requires identification of subjects t...
This paper presents an active learning approach to the problem of systematic noise inference and noise elimination, specifically the inference of Associated Corruption (AC) rules...