Filter your results
- 2
- 2
- 2
- 1
- 1
- 2
- 2
- 1
- 1
- 1
|
|
sorted by
|
|
Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.137-152, ⟨10.1007/978-3-319-24018-3_9⟩
Conference papers
hal-01442558v1
|
||
|
Towards an Automated Extraction of ABAC Constraints from Natural Language Policies34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.105-119, ⟨10.1007/978-3-030-22312-0_8⟩
Conference papers
hal-03744313v1
|