Ambiguity and Generality in Natural Language Privacy Policies | 0 | 0.34 | 2021 |
Analyzing privacy policies through syntax-driven semantic analysis of information types | 1 | 0.38 | 2021 |
Cree: A Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies | 0 | 0.34 | 2021 |
Access Control Policy Generation From User Stories Using Machine Learning | 0 | 0.34 | 2021 |
ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis | 1 | 0.35 | 2021 |
How does misconfiguration of analytic services compromise mobile privacy? | 1 | 0.36 | 2020 |
Disambiguating Requirements Through Syntax-Driven Semantic Analysis of Information Types. | 1 | 0.35 | 2020 |
Toward Detection of Access Control Models from Source Code via Word Embedding | 0 | 0.34 | 2019 |
Privacy Assurance for Android Augmented Reality Apps | 0 | 0.34 | 2019 |
Toward a reliability measurement framework automated using deep learning | 0 | 0.34 | 2019 |
Taming web views in the detection of Android privacy leaks | 0 | 0.34 | 2019 |
GUILeak: tracing privacy policy claims on user input data for Android applications. | 4 | 0.41 | 2018 |
Inferring Ontology Fragments From Semantic Role Typing Of Lexical Variants | 1 | 0.36 | 2018 |
Extracting Information Types from Android Layout Code Using Sequence to Sequence Learning. | 1 | 0.36 | 2018 |
Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language | 1 | 0.36 | 2017 |
Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures | 1 | 0.40 | 2017 |
Lexical Similarity of Information Type Hypernyms, Meronyms and Synonyms in Privacy Policies. | 0 | 0.34 | 2016 |
Sequence Diagram Aided Privacy Policy Specification | 0 | 0.34 | 2016 |
PVDetector: a detector of privacy-policy violations for Android apps. | 1 | 0.41 | 2016 |
Toward a framework for detecting privacy policy violations in android application code. | 22 | 0.77 | 2016 |
Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges. | 0 | 0.34 | 2016 |
Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies | 1 | 0.35 | 2015 |
Less is more?: investigating the role of examples in security studies using analogical transfer | 0 | 0.34 | 2014 |
Managing security requirements patterns using feature diagram hierarchies | 0 | 0.34 | 2014 |
Formal verification of security properties in trust management policy | 0 | 0.34 | 2014 |
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule | 13 | 0.67 | 2013 |
Refinement-based design of a group-centric secure information sharing model | 1 | 0.36 | 2012 |
Monitoring Dense-Time, Continuous-Semantics, Metric Temporal Logic. | 2 | 0.37 | 2012 |
Ensuring authorization privileges for cascading user obligations | 2 | 0.37 | 2012 |
Characterizations and boundaries of security requirements patterns | 3 | 0.45 | 2012 |
Formal Analysis of Sequence Diagram with Combined Fragments. | 0 | 0.34 | 2012 |
On XACML's adequacy to specify and to enforce HIPAA | 5 | 0.45 | 2012 |
GitBAC: Flexible access control for non-modular concerns | 0 | 0.34 | 2011 |
Group-Centric Secure Information-Sharing Models for Isolated Groups | 15 | 0.77 | 2011 |
Deconstructing the semantics of big-step modelling languages | 12 | 0.59 | 2010 |
Group-centric models for secure and agile information sharing | 5 | 0.52 | 2010 |
Semantic Criteria for Choosing a Language for Big-Step Models | 4 | 0.40 | 2009 |
Toward practical analysis for trust management policy | 5 | 0.38 | 2009 |
Foundations for group-centric secure information sharing models | 26 | 1.17 | 2009 |
Towards a framework for group-centric secure collaboration | 15 | 1.08 | 2009 |
A conceptual framework for Group-Centric secure information sharing | 14 | 0.92 | 2009 |
Role-based trust management security policy analysis and correction environment (RT-SPACE) | 3 | 0.42 | 2008 |
Role Based Access Control and OWL. | 6 | 0.56 | 2008 |
Formalize UML 2 Sequence Diagrams | 4 | 0.52 | 2008 |
ROWLBAC: representing role based access control in OWL | 37 | 2.44 | 2008 |
Stale-safe security properties for group-based secure information sharing | 14 | 0.84 | 2008 |
Apply Model Checking to Security Analysis in Trust Management | 6 | 0.51 | 2007 |
Mapping template semantics to SMV | 7 | 0.44 | 2004 |
Understanding and Comparing Model-Based Specification Notations | 6 | 0.60 | 2003 |
Template Semantics for Model-Based Notations | 31 | 1.43 | 2003 |