120 Domain-Specific Languages for Security
Security engineering, from security requirements engineering to the implementation of
cryptographic protocols, is often supported by domain-specific languages (DSLs) …
cryptographic protocols, is often supported by domain-specific languages (DSLs) …
Identification and analysis of handovers in organisations using process model repositories
Purpose Identifying handovers is an important but difficult to achieve goal for companies as
handovers have advantages allowing for specialisation in processes as well as …
handovers have advantages allowing for specialisation in processes as well as …
[PDF][PDF] Constrained role-engineering optimization using Boolean matrix decomposition and integer linear programming techniques
W Sun - … Journal of Innovative Computing, Information and …, 2022 - ijicic.org
Role-based access control (RBAC) is a widely popular access control mechanism because
of its convenience for authorization administration, as well as various security policies, such …
of its convenience for authorization administration, as well as various security policies, such …
Terminology for evolving design artifacts
Many design researchers evolve artifacts in succeeding projects. Yet, these researchers lack
a terminology to describe how their artifacts evolve. We provide such a terminology by …
a terminology to describe how their artifacts evolve. We provide such a terminology by …
Role-mining optimization with separation-of-duty constraints and security detections for authorizations
W Sun, S Wei, H Guo, H Liu - Future Internet, 2019 - mdpi.com
Role-based access control (RBAC), which has been regarded as one of the most popular
access-control mechanisms, is featured by the separation-of-duty constraints, mutually …
access-control mechanisms, is featured by the separation-of-duty constraints, mutually …
Role-engineering optimization with cardinality constraints and user-oriented mutually exclusive constraints
W Sun, H Su, H Liu - Information, 2019 - mdpi.com
Role-based access control (RBAC) is one of the most popular access-control mechanisms
because of its convenience for management and various security policies, such as …
because of its convenience for management and various security policies, such as …
Delegation Security Analysis in Workflow Systems
User delegation is a type of access control mechanisms that allow a person to delegate all
or part of his her authorities to others. It is an important access control policy that can …
or part of his her authorities to others. It is an important access control policy that can …
Hybrid Role‐Engineering Optimization with Multiple Cardinality Constraints Using Natural Language Processing and Integer Linear Programming Techniques
W Sun - Mobile Information Systems, 2022 - Wiley Online Library
Role‐based access control (RBAC) is a widely popular access control mechanism because
of its convenience for authorization administration, as well as various security policies, such …
of its convenience for authorization administration, as well as various security policies, such …
Detecting role inconsistencies in process models
Business process models capture crucial information about business operations. To
overcome the challenge of maintaining process definitions in large process repositories …
overcome the challenge of maintaining process definitions in large process repositories …
УДОСКОНАЛЕННЯ МЕТОДУ ВИЯВЛЕННЯ НЕПРАВДИВОЇ ІНФОРМАЦІЇ ЗА ДОПОМОГОЮ БАЙЕСОВСКОГО КЛАСИФІКАТОРА.
Н Лукова-Чуйко, Т Лаптєва - Ukrainian Scientific Journal of …, 2022 - search.ebscohost.com
У статті наведено аналіз рішень прикладних задач, що вирішуюся шляхом
застосування методів кластерного аналізу. Це і класичні задачі Data Mining …
застосування методів кластерного аналізу. Це і класичні задачі Data Mining …