ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Access Control Policy Generation from User Stories Using Machine Learning
Data and Applications Security and Privacy XXXV - Lecture Notes in Computer Science
◽
10.1007/978-3-030-81242-3_10
◽
2021
◽
pp. 171-188
Author(s):
John Heaps
◽
Ram Krishnan
◽
Yufei Huang
◽
Jianwei Niu
◽
Ravi Sandhu
Keyword(s):
Machine Learning
◽
Access Control
◽
Control Policy
◽
Access Control Policy
◽
User Stories
Download Full-text
Related Documents
Cited By
References
Inferring Access-Control Policy Properties via Machine Learning
Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)
◽
10.1109/policy.2006.19
◽
2006
◽
Cited By ~ 6
Author(s):
E. Martin
◽
Tao Xie
Keyword(s):
Machine Learning
◽
Access Control
◽
Control Policy
◽
Access Control Policy
Download Full-text
Machine Learning for Access Control Policy Verification
10.6028/nist.ir.8360-draft
◽
2021
◽
Author(s):
Vincent C. Hu
Keyword(s):
Machine Learning
◽
Access Control
◽
Control Policy
◽
Access Control Policy
Download Full-text
Machine Learning for Access Control Policy Verification
10.6028/nist.ir.8360
◽
2021
◽
Author(s):
Vincent C. Hu
Keyword(s):
Machine Learning
◽
Access Control
◽
Control Policy
◽
Access Control Policy
Download Full-text
Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things
International Journal of Advanced Computer Science and Applications
◽
10.14569/ijacsa.2017.080757
◽
2017
◽
Vol 8
(7)
◽
Cited By ~ 29
Author(s):
Aissam OUTCHAKOUCHT
◽
Hamza ES-SAMAALI
◽
Jean Philippe
Keyword(s):
Machine Learning
◽
Internet Of Things
◽
Access Control
◽
Control Policy
◽
The Internet
◽
Access Control Policy
◽
The Internet Of Things
◽
Dynamic Access Control
Download Full-text
Access Control Policy Maintenance in IoT Based on Machine Learning
Journal of Circuits System and Computers
◽
10.1142/s0218126621501899
◽
2020
◽
Author(s):
Yinyan Zhao
◽
Mang Su
◽
Jie Wan
◽
Jinpeng Hou
◽
Dong Mei
Keyword(s):
Machine Learning
◽
Access Control
◽
Control Policy
◽
Access Control Policy
Download Full-text
A Novel Scheme for Access Control Policy Generating and Evaluating in IoT based on Machine Learning
2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)
◽
10.1109/ithings-greencom-cpscom-smartdata-cybermatics50389.2020.00079
◽
2020
◽
Author(s):
Yinyan Zhao
◽
Mang Su
◽
Jie Wan
◽
Jinpeng Hou
◽
Dong Mei
Keyword(s):
Machine Learning
◽
Access Control
◽
Control Policy
◽
Access Control Policy
Download Full-text
Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic
New Generation Computing
◽
10.1007/s00354-021-00130-6
◽
2021
◽
Author(s):
Sudakshina Mandal
◽
Danish Ali Khan
◽
Sarika Jain
Keyword(s):
Access Control
◽
Control Policy
◽
Access Control Policy
◽
Work From Home
◽
Support Work
Download Full-text
Access Control Policy Enforcement for Zero-Trust-Networking
2018 29th Irish Signals and Systems Conference (ISSC)
◽
10.1109/issc.2018.8585365
◽
2018
◽
Cited By ~ 3
Author(s):
Romans Vanickis
◽
Paul Jacob
◽
Sohelia Dehghanzadeh
◽
Brian Lee
Keyword(s):
Access Control
◽
Control Policy
◽
Policy Enforcement
◽
Access Control Policy
Download Full-text
Visualization Analysis of Multi-Domain Access Control Policy Integration Based on Tree-Maps and Semantic Substrates
Intelligent Information Management
◽
10.4236/iim.2012.46028
◽
2012
◽
Vol 04
(06)
◽
pp. 188-193
Author(s):
Li Pan
Keyword(s):
Access Control
◽
Control Policy
◽
Policy Integration
◽
Access Control Policy
◽
Visualization Analysis
Download Full-text
Access Control Policy Languages
Encyclopedia of Database Systems
◽
10.1007/978-1-4899-7993-3_5-2
◽
2014
◽
pp. 1-6
Author(s):
Athena Vakali
Keyword(s):
Access Control
◽
Control Policy
◽
Access Control Policy
◽
Policy Languages
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close