Follow
John Heaps
Title
Cited by
Cited by
Year
Access control policy generation from user stories using machine learning
J Heaps, R Krishnan, Y Huang, J Niu, R Sandhu
Data and Applications Security and Privacy XXXV: 35th Annual IFIP WG 11.3 …, 2021
112021
Ambiguity and generality in natural language privacy policies
MB Hosseini, J Heaps, R Slavin, J Niu, T Breaux
2021 IEEE 29th International Requirements Engineering Conference (RE), 70-81, 2021
72021
Toward detection of access control models from source code via word embedding
J Heaps, X Wang, T Breaux, J Niu
Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019
52019
DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data
X Zhang, J Heaps, R Slavin, J Niu, T Breaux, X Wang
ACM Transactions on Software Engineering and Methodology 32 (4), 1-34, 2023
12023
Code Element Vector Representations Through the Application of Natural Language Processing Techniques for Automation of Software Privacy Analysis
J Heaps
The University of Texas at San Antonio, 2020
12020
Toward a code pattern based vulnerability measurement model
J Heaps, R Slavin, X Wang
Proceedings of the 23nd ACM on Symposium on Access Control Models and …, 2018
12018
Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures
C Johnson, T MacGahan, J Heaps, K Baldor, J von Ronne, J Niu
Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017
12017
Toward a reliability measurement framework automated using deep learning
J Heaps, X Zhang, X Wang, T Breaux, J Niu
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019
2019
Automating Dependability Analysis for Software Systems
J Heaps
The system can't perform the operation now. Try again later.
Articles 1–9