Constrained Role Mining

Carlo Blundo, Stelvio Cimato. Constrained Role Mining. In Audun Jøsang, Pierangela Samarati, Marinella Petrocchi, editors, Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. Volume 7783 of Lecture Notes in Computer Science, pages 289-304, Springer, 2012. [doi]

Authors

Carlo Blundo

This author has not been identified. Look up 'Carlo Blundo' in Google

Stelvio Cimato

This author has not been identified. It may be one of the following persons: Look up 'Stelvio Cimato' in Google