异常权限配置下的角色挖掘方案
沈卓炜, 范琳丽, 华童, 王科翔
Role Mining Scheme with Abnormal Permission Configuration
SHEN Zhuowei, FAN Linli, HUA Tong, WANG Kexiang
信息网络安全 . 2022, (11): 7 -16 .  DOI: 10.3969/j.issn.1671-1122.2022.11.002