↓ Skip to main content

Information Systems Security

Overview of attention for book
Cover of 'Information Systems Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Analyzing Explicit Information Flow
  3. Altmetric Badge
    Chapter 2 WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper)
  4. Altmetric Badge
    Chapter 3 Toward Securely Programming the Internet
  5. Altmetric Badge
    Chapter 4 Attribution of Malicious Behavior
  6. Altmetric Badge
    Chapter 5 Unifying Facets of Information Integrity
  7. Altmetric Badge
    Chapter 6 Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation
  8. Altmetric Badge
    Chapter 7 Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems
  9. Altmetric Badge
    Chapter 8 Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation
  10. Altmetric Badge
    Chapter 9 Coverage Criteria for Automatic Security Testing of Web Applications
  11. Altmetric Badge
    Chapter 10 A Practical Generic Privacy Language
  12. Altmetric Badge
    Chapter 11 Efficient Detection of the Return-Oriented Programming Malicious Code
  13. Altmetric Badge
    Chapter 12 ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
  14. Altmetric Badge
    Chapter 13 Mining RBAC Roles under Cardinality Constraint
  15. Altmetric Badge
    Chapter 14 Specification of History Based Constraints for Access Control in Conceptual Level
  16. Altmetric Badge
    Chapter 15 Abstracting Audit Data for Lightweight Intrusion Detection
  17. Altmetric Badge
    Chapter 16 A Persistent Public Watermarking of Relational Databases
  18. Altmetric Badge
    Chapter 17 Security Rules versus Security Properties
  19. Altmetric Badge
    Chapter 18 Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains
Attention for Chapter 13: Mining RBAC Roles under Cardinality Constraint
Altmetric Badge

Mentioned by

patent
1 patent

Readers on

mendeley
11 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Mining RBAC Roles under Cardinality Constraint
Chapter number 13
Book title
Information Systems Security
Published by
Springer, Berlin, Heidelberg, December 2010
DOI 10.1007/978-3-642-17714-9_13
Book ISBNs
978-3-64-217713-2, 978-3-64-217714-9
Authors

Ravi Kumar, Shamik Sural, Arobinda Gupta, Kumar, Ravi, Sural, Shamik, Gupta, Arobinda

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 11 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
India 1 9%
Unknown 10 91%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 64%
Student > Postgraduate 1 9%
Other 1 9%
Student > Master 1 9%
Unknown 1 9%
Readers by discipline Count As %
Computer Science 9 82%
Engineering 1 9%
Unknown 1 9%