Author of the publication

Mining Likely Properties of Access Control Policies via Association Rule Mining.

, , , and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 193-208. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hwang, JeeHyun
add a person with the name Hwang, JeeHyun
 

Other publications of authors with the same name

Systematic Structural Testing of Firewall Policies., , , and . SRDS, page 105-114. IEEE Computer Society, (2008)Selection of regression system tests for security policy evolution., , , , and . ASE, page 266-269. ACM, (2012)ACPT: A Tool for Modeling and Verifying Access Control Policies., , , and . POLICY, page 40-43. IEEE Computer Society, (2010)Access control policy evolution: an empirical study., , and . HotSoS, page 28. ACM, (2014)Assessing Quality of Policy Properties in Verification of Access Control Policies., , , and . ACSAC, page 163-172. IEEE Computer Society, (2008)Refactoring access control policies for performance improvement., , , , and . ICPE, page 323-334. ACM, (2012)First Step Towards Automatic Correction of Firewall Policy Faults., , , and . LISA, USENIX Association, (2010)Policy-Based Testing., , , and . Encyclopedia of Software Engineering, Taylor & Francis, (2010)Conformance Checking of Access Control Policies Specified in XACML., , , and . COMPSAC (2), page 275-280. IEEE Computer Society, (2007)978-0-7695-2870-0.Mining Likely Properties of Access Control Policies via Association Rule Mining., , , and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 193-208. Springer, (2010)