Access control policy generation from user stories using machine learning J Heaps, R Krishnan, Y Huang, J Niu, R Sandhu Data and Applications Security and Privacy XXXV: 35th Annual IFIP WG 11.3 …, 2021 | 17 | 2021 |
Ambiguity and generality in natural language privacy policies MB Hosseini, J Heaps, R Slavin, J Niu, T Breaux 2021 IEEE 29th International Requirements Engineering Conference (RE), 70-81, 2021 | 10 | 2021 |
Toward detection of access control models from source code via word embedding J Heaps, X Wang, T Breaux, J Niu Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019 | 6 | 2019 |
DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data X Zhang, J Heaps, R Slavin, J Niu, T Breaux, X Wang ACM Transactions on Software Engineering and Methodology 32 (4), 1-34, 2023 | 3 | 2023 |
Toward a code pattern based vulnerability measurement model J Heaps, R Slavin, X Wang Proceedings of the 23nd ACM on Symposium on Access Control Models and …, 2018 | 3 | 2018 |
Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures C Johnson, T MacGahan, J Heaps, K Baldor, J von Ronne, J Niu Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017 | 3 | 2017 |
Code Element Vector Representations Through the Application of Natural Language Processing Techniques for Automation of Software Privacy Analysis J Heaps The University of Texas at San Antonio, 2020 | 1 | 2020 |
Toward a reliability measurement framework automated using deep learning J Heaps, X Zhang, X Wang, T Breaux, J Niu Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019 | | 2019 |
Automating Dependability Analysis for Software Systems J Heaps | | |