-
1
-
-
10944272139
-
Friends and neighbors on the Web
-
DOI 10.1016/S0378-8733(03)00009-1, PII S0378873303000091
-
ADAMIC, L. A., AND ADAR, E. Friends and neighbors on the web. Social Networks 25(3) (2003), 211-230. (Pubitemid 36831776)
-
(2003)
Social Networks
, vol.25
, Issue.3
, pp. 211-230
-
-
Adamic, L.A.1
Adar, E.2
-
2
-
-
45749089618
-
Purpose based access control for privacy protection in relational database systems
-
BYUN, 1., AND U, N. Purpose based access control for privacy protection in relational database systems. VLDB 17 (2008), 603-619 .
-
(2008)
VLDB
, vol.17
, pp. 603-619
-
-
Byun, J.1
Li, N.2
-
3
-
-
79952805765
-
Detection of anomalous insiders in collaborative environments via relational analysis of access logs
-
CHEN, Y., AND MALIN, B. Detection of anomalous insiders in collaborative environments via relational analysis of access logs. In CODA SPY (2011), pp. 63-74.
-
(2011)
CODA SPY
, pp. 63-74
-
-
Chen, Y.1
Malin, B.2
-
4
-
-
33845998197
-
Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System
-
Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings
-
CHEN, Y., Y. U, CHENG, X., AND Guo, L. Survey and taxonomy of feature selection algorithms in intrusion detection system. In Inscrypt (2006), pp. 153-167. (Pubitemid 46039537)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4318
, pp. 153-167
-
-
Chen, Y.1
Li, Y.2
Cheng, X.-Q.3
Guo, L.4
-
5
-
-
70350070573
-
Developing insider attack detection model: A grounded approach
-
Doss, G., AND G.TEJAY. Developing insider attack detection model: A grounded approach. In ISI(2009), pp. 107-112.
-
(2009)
ISI
, pp. 107-112
-
-
Doss, G.1
Tejay, G.2
-
6
-
-
70350052839
-
Applying graph-based anomaly detection approaches to the discovery of insider threats
-
EBERLE, W., AND HOLDER, L. Applying graph-based anomaly detection approaches to the discovery of insider threats. In ISI(2009), pp. 206-208.
-
(2009)
ISI
, pp. 206-208
-
-
Eberle, W.1
Holder, L.2
-
7
-
-
76849086013
-
Behavioral changes following the collaborative development of an accounting information system
-
ELDENBURG, L., SODERSTROM, N., W ILLIS, Y., AND Wu, A. Behavioral changes following the collaborative development of an accounting information system. Accounting, Organizations and Society 35, 2 (2010), 222-237.
-
(2010)
Accounting, Organizations and Society
, vol.35
, Issue.2
, pp. 222-237
-
-
Eldenburg, L.1
Soderstrom, N.2
Illis Y, W.3
Wu, A.4
-
8
-
-
0035790754
-
Flexible team-based access control using contexts
-
GEORGIADIS, c., MAVRIDIS, I., PANGALOS, G., AND THOMAS, R. Flexible team-based access control using contexts. In SACMAT (2001), pp. 21-27.
-
(2001)
SACMAT
, pp. 21-27
-
-
Georgiadis, C.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.4
-
9
-
-
44549088088
-
Collective knowledge systems: Where the social web meets the semantic web
-
GRUBER, T. Collective knowledge systems: where the social web meets the semantic web. Journal of Web Semantics 6, 1 (2007), 4-13.
-
(2007)
Journal of Web Semantics
, vol.6
, Issue.1
, pp. 4-13
-
-
Gruber, T.1
-
10
-
-
27644565865
-
Can electronic medical record systems transform health care?
-
HILLESTAD, R., BIGELOW, J., BOWER, A., GIROSI, F., MElLI, R., SCOVILLE, R., AND TAYLOR, R. Can electronic medical record systems transform health care? Health Affairs 24 (2005), 1103-1107.
-
(2005)
Health Affairs
, vol.24
, pp. 1103-1107
-
-
Hillestad, R.1
Bigelow, J.2
Bower, A.3
Girosi, F.4
Melli, R.5
Scoville, R.6
Taylor, R.7
-
11
-
-
47649119832
-
A collaborative support tool for creativity learning: Idea storming cube
-
HUANG, C., U, T., WANG, H., AND CHANG, C. A collaborative support tool for creativity learning: Idea storming cube. In ICALT (2007), pp. 31-35.
-
(2007)
ICALT
, pp. 31-35
-
-
Huang, C.1
Li, T.2
Wang, H.3
Chang, C.4
-
12
-
-
57349145290
-
Context-aware role-based access control in pervasive computing systems
-
KULKARNI, D., AND TRIPATHI, A. Context-aware role-based access control in pervasive computing systems. In SACMAT (2008), pp. 113-122.
-
(2008)
SACMAT
, pp. 113-122
-
-
Kulkarni, D.1
Tripathi, A.2
-
13
-
-
84890758488
-
Governance in social media: A case study of the Wikipedia promotion process
-
LESKOVEC, J., HUTTENLOCHER, D., AND KLEINBERG, J. Governance in social media: A case study of the Wikipedia promotion process. In [CWSM (2010).
-
(2010)
CWSM
-
-
Leskovec, J.1
Huttenlocher, D.2
Kleinberg, J.3
-
14
-
-
79952774177
-
Learning relational policies from electronic health record access logs
-
In Press
-
MALIN, B., NYEMBA, S., AND PAULETT, J. Learning relational policies from electronic health record access logs. JBI (2011), In Press.
-
(2011)
JBI
-
-
Malin, B.1
Nyemba, S.2
Paulett, J.3
-
15
-
-
33745956063
-
Reviewing the benefits and costs of electronic health records and associated patient safety technologies
-
DOI 10.1007/s10916-005-7988-x
-
MENACHEMI, N., AND BROOKS, R. Reviewing the benefits and costs of electronic health records and associated patient safety technologies. Journal of Medical Systems 30, 3 (2008), 159-168. (Pubitemid 44060918)
-
(2006)
Journal of Medical Systems
, vol.30
, Issue.3
, pp. 159-168
-
-
Menachemi, N.1
Brooks, R.G.2
-
16
-
-
12244268431
-
Graph-based anomaly detection
-
NOBLE, C. C., AND COOK, D. J. Graph-based anomaly detection. In SIGKDD (2003), pp. 631-636.
-
(2003)
SIGKDD
, pp. 631-636
-
-
Noble, C.C.1
Cook, D.J.2
-
17
-
-
84994391858
-
Role-based access control on the web
-
PARK, J., SANDHU, R., AND AHN, G. Role-based access control on the web. ACM Transactions on Information System Security 4, 1 (2001), 37-71.
-
(2001)
ACM Transactions on Information System Security
, vol.4
, Issue.1
, pp. 37-71
-
-
Park, J.1
Sandhu, R.2
Ahn, G.3
-
18
-
-
85052617391
-
Item-based collaborative filtering recommendation algorithms
-
SARWAR, B., KARYPIS, G., KONSTAN, J., AND J.RIEDL. Item-based collaborative filtering recommendation algorithms. In WWW (2001), pp. 285-295.
-
(2001)
WWW
, pp. 285-295
-
-
Sarwar, B.1
Karypis, G.2
Konstan, J.3
Riedl, J.4
-
19
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
DOI 10.1016/S0167-4048(02)01009-X
-
SCHULTZ, E. A framework for understanding and predicting insider attacks. Computers and Security 21, 6 (2002), 526-531. (Pubitemid 35186246)
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
21
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
SHYU, M., CHEN, S., SARINNAPAKORN, K., AND CHANG, L. A novel anomaly detection scheme based on principal component classifier. In ICDM (2003), pp. 172-179.
-
(2003)
ICDM
, pp. 172-179
-
-
Shyu, M.1
Chen, S.2
Sarinnapakorn, K.3
Chang, L.4
-
22
-
-
34548580783
-
Neighborhood formation and anomaly detection in bipartite graphs
-
DOI 10.1109/ICDM.2005.103, 1565707, Proceedings - Fifth IEEE International Conference on Data Mining, ICDM 2005
-
SUN, 1., QU, H., CHAKRABARTI, D., AND FALOUTSOS, C. Neighborhood formation and anomaly detection in bipartite graph. In ICDM (2005), pp. 418-425. (Pubitemid 47385721)
-
(2005)
Proceedings - IEEE International Conference on Data Mining, ICDM
, pp. 418-425
-
-
Jimeng, S.1
Huiming, Q.2
Chakrabarti, D.3
Faloutsos, C.4
-
23
-
-
0002841051
-
Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management
-
THOMAS, R., AND SANDHU, S. Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management. In IFfP [CDS (1997), pp. 166-181.
-
(1997)
IFfP [CDS]
, pp. 166-181
-
-
Thomas, R.1
Sandhu, S.2
-
24
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
WAGNER, D., AND SOTO, P. Mimicry attacks on host-based intrusion detection systems. In CCS (2002), pp. 255-264.
-
(2002)
CCS
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
-
25
-
-
70350075657
-
Injecting a permission-based delegation model to secure web-based workflow systems
-
WANG, X., AND BAYRAK, C. Injecting a permission-based delegation model to secure web-based workflow systems. In ISI(2009), pp. 101-106.
-
(2009)
ISI
, pp. 101-106
-
-
Wang, X.1
Bayrak, C.2
-
28
-
-
3042684910
-
A rule-based framework for rolebased delegation and revocation
-
ZHANG, L., AHN, G., AND CHU, B. A rule-based framework for rolebased delegation and revocation. ACM Transactions on Information System Security 6, 3 (2003), 404-441.
-
(2003)
ACM Transactions on Information System Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.2
Chu, B.3
|