Author of the publication

Relation extraction for inferring access control rules from natural language artifacts.

, , , and . ACSAC, page 366-375. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing database access control policy from unconstrained natural language text.. ICSE, page 1357-1360. IEEE Computer Society, (2013)Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , and . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)Classifying Natural Language Sentences for Policy., and . POLICY, page 33-36. IEEE Computer Society, (2012)Learning Contextual Embeddings for Knowledge Graph Completion., , , and . PACIS, page 248. (2017)Using templates to elicit implied security requirements from functional requirements - a controlled experiment., , , and . ESEM, page 22:1-22:10. ACM, (2014)DIGS: A Framework for Discovering Goals for Security Requirements Engineering., , , , and . ESEM, page 35:1-35:10. ACM, (2016)Relation extraction for inferring access control rules from natural language artifacts., , , and . ACSAC, page 366-375. ACM, (2014)Evolving FinTech 512 'Software Engineering For Financial Technology'., and . SEENG, page 17-24. IEEE, (2023)Access Control Policy Extraction from Unconstrained Natural Language Text., and . SocialCom, page 435-440. IEEE Computer Society, (2013)Fuse: A Reproducible, Extendable, Internet-Scale Corpus of Spreadsheets., , , , and . MSR, page 486-489. IEEE Computer Society, (2015)