Large softwaresystemsrequiredecompositionalmechanismsinorder tomake themtractable. Traditionally, MILs and IDLs have played this role by providing notations based on definition/us...
Prepaid customers in mobile telecommunications are not bound by a contract and can therefore change operators (‘churn’) at their convenience and without notification. This make...
Dejan Radosavljevik, Peter van der Putten, Kim Kyl...
In this paper we introduce a new view on roles in Object Oriented programming languages, based on an ontological analysis of roles. A role is always associated with an object inst...
Matteo Baldoni, Guido Boella, Leendert W. N. van d...
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluat...
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, ...
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...