-
1
-
-
10944272139
-
Friends and neighbors on the Web
-
DOI 10.1016/S0378-8733(03)00009-1, PII S0378873303000091
-
L.A. Adamic and E. Adar, "Friends and Neighbors on the Web," Social Networks, vol. 25, no. 3, pp. 211-230, 2003. (Pubitemid 36831776)
-
(2003)
Social Networks
, vol.25
, Issue.3
, pp. 211-230
-
-
Adamic, L.A.1
Adar, E.2
-
2
-
-
84856165181
-
Preventing information leakage between collaborating organisations
-
M. Alawneh and I. Abbadi, "Preventing Information Leakage between Collaborating Organisations," Proc. 10th Int'l Conf. Electronic Commerce, pp. 185-194, 2008.
-
(2008)
Proc. 10th Int'l Conf. Electronic Commerce
, pp. 185-194
-
-
Alawneh, M.1
Abbadi, I.2
-
3
-
-
0030393538
-
Walking away from the desktop computer: Distributed collaboration and mobility in a product design team
-
V. Bellotti and S. Bly, "Walking Away from the Desktop Computer: Distributed Collaboration and Mobility in a Product Design Team," Proc. ACM Conf. Computer Supported Cooperative Work, pp. 209-218, 1996.
-
(1996)
Proc. ACM Conf. Computer Supported Cooperative Work
, pp. 209-218
-
-
Bellotti, V.1
Bly, S.2
-
4
-
-
78650277787
-
Collaborative information system design
-
F. Benaben, J. Touzi, V. Rajsiri, and H. Pingaud, "Collaborative Information System Design," Proc. Int'l Conf. Assoc. Information and Management, pp. 281-296, 2006.
-
(2006)
Proc. Int'l Conf. Assoc. Information and Management
, pp. 281-296
-
-
Benaben, F.1
Touzi, J.2
Rajsiri, V.3
Pingaud, H.4
-
5
-
-
79959638566
-
Using statistical and machine learning to help institutions detect suspicious access to electronic health records
-
A.A. Boxwala, J. Kim, J.M. Grillo, and L.O. Machado, "Using Statistical and Machine Learning to Help Institutions Detect Suspicious Access to Electronic Health Records," J. Am. Medical Informatics Assoc., vol. 18, pp. 498-505, 2011.
-
J. Am. Medical Informatics Assoc.
, vol.18
, Issue.2011
, pp. 498-505
-
-
Boxwala, A.A.1
Kim, J.2
Grillo, J.M.3
Machado, L.O.4
-
6
-
-
45749089618
-
Purpose based access control for privacy protection in relational database systems
-
J. Byun and N. Li, "Purpose Based Access Control for Privacy Protection in Relational Database Systems," Int'l J. Very Large Data Bases, vol. 17, pp. 603-619, 2008.
-
(2008)
Int'l J. Very Large Data Bases
, vol.17
, pp. 603-619
-
-
Byun, J.1
Li, N.2
-
7
-
-
33748081445
-
TrustBAC - Integrating trust relationships into the RBAC model for access control in open systems
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
S. Chakraborty and I. Ray, "TrustBac: Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems," Proc. 11th ACM Symp. Access Control Models and Technologies, pp. 49-58, 2006. (Pubitemid 44300741)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 49-58
-
-
Chakraborty, S.1
Ray, I.2
-
8
-
-
10644280105
-
Intelligence and security informatics for homeland security: Information, communication, and transportation
-
Dec.
-
H. Chen, F. Wang, and D. Zeng, "Intelligence and Security Informatics for Homeland Security: Information, Communication, and Transportation," IEEE Trans. Intelligent Transportation Systems, vol. 5, no. 4, pp. 329-341, Dec. 2004.
-
(2004)
IEEE Trans. Intelligent Transportation Systems
, vol.5
, Issue.4
, pp. 329-341
-
-
Chen, H.1
Wang, F.2
Zeng, D.3
-
9
-
-
0442298972
-
COPLINK: Managing law enforcement data and knowledge
-
H. Chen, D. Zeng, H. Atabakhsh, W. Wyzga, and J. Schroeder, "COPLINK: Managing Law Enforcement Data and Knowledge," Comm. ACM, vol. 46, no. 1, pp. 28-34, 2003.
-
(2003)
Comm. ACM
, vol.46
, Issue.1
, pp. 28-34
-
-
Chen, H.1
Zeng, D.2
Atabakhsh, H.3
Wyzga, W.4
Schroeder, J.5
-
11
-
-
80052910270
-
Leveraging social networks to detect anomalous insider actions in collaborative environments
-
Y. Chen, S. Nyemba, W. Zhang, and B. Malin, "Leveraging Social Networks to Detect Anomalous Insider Actions in Collaborative Environments," Proc. IEEE Ninth Intelligence and Security Informatics, pp. 119-124, 2011.
-
(2011)
Proc. IEEE Ninth Intelligence and Security Informatics
, pp. 119-124
-
-
Chen, Y.1
Nyemba, S.2
Zhang, W.3
Malin, B.4
-
12
-
-
34548769351
-
-
Research Report RC24190 (W0702-085), IBM
-
P. Cheng, P. Rohatgi, C. Keser, P.A. Karger, and G.M. Wagner, "Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control," Research Report RC24190 (W0702-085), IBM, 2007.
-
(2007)
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control
-
-
Cheng, P.1
Rohatgi, P.2
Keser, C.3
Karger, P.A.4
Wagner, G.M.5
-
15
-
-
76849086013
-
-
Accounting, Organizations and Soc.
-
L. Eldenburg, N. Soderstrom, V. Willis, and A. Wu, "Behavioral Changes Following the Collaborative Development of an Accounting Information System," Accounting, Organizations and Soc., vol. 35, no. 2, pp. 222-237, 2010.
-
(2010)
Behavioral Changes Following the Collaborative Development of an Accounting Information System
, vol.35
, Issue.2
, pp. 222-237
-
-
Eldenburg, L.1
Soderstrom, N.2
Willis, V.3
Wu, A.4
-
16
-
-
73549125255
-
A study of collaborative group work with and without computer-based support
-
J. George, G. Easton, J. Nunamaker, and G. Northcraft, "A Study of Collaborative Group Work with and without Computer-Based Support," Information Systems Research, vol. 1, no. 4, pp. 394-415, 1990.
-
(1990)
Information Systems Research
, vol.1
, Issue.4
, pp. 394-415
-
-
George, J.1
Easton, G.2
Nunamaker, J.3
Northcraft, G.4
-
17
-
-
0035790754
-
Flexible team-based access control using contexts
-
C. Georgiadis, I. Mavridis, G. Pangalos, and R. Thomas, "Flexible Team-Based Access Control Using Contexts," Proc. Sixth ACM Symp. Access Control Models and Technologies, pp. 21-27, 2001.
-
(2001)
Proc. Sixth ACM Symp. Access Control Models and Technologies
, pp. 21-27
-
-
Georgiadis, C.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.4
-
18
-
-
16544393309
-
Supporting communication in an integrated patient record system
-
D. Giuse, "Supporting Communication in an Integrated Patient Record System," Proc. Ann. Symp. Am. Medical Informatics Assoc., p. 1065, 2003.
-
(2003)
Proc. Ann. Symp. Am. Medical Informatics Assoc.
, pp. 1065
-
-
Giuse, D.1
-
19
-
-
44549088088
-
Collective knowledge systems: Where the social web meets the semantic web
-
T. Gruber, "Collective Knowledge Systems: Where the Social Web Meets the Semantic Web," J. Web Semantics, vol. 6, no. 1, pp. 4-13, 2007.
-
(2007)
J. Web Semantics
, vol.6
, Issue.1
, pp. 4-13
-
-
Gruber, T.1
-
20
-
-
80053461711
-
Experience-based access management: A life-cycle framework for identity and access management systems
-
Sept./Oct.
-
C. Gunter, D. Liebovitz, and B. Malin, "Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems," IEEE Security and Privacy Magazine, vol. 9, no. 5, pp. 48-55, Sept./Oct. 2011.
-
(2011)
IEEE Security and Privacy Magazine
, vol.9
, Issue.5
, pp. 48-55
-
-
Gunter, C.1
Liebovitz, D.2
Malin, B.3
-
21
-
-
70350635778
-
Network anomaly detection based on eigen equation compression
-
S. Hirose, K. Yamanishi, T. Nakata, and R. Fukimaki, "Network Anomaly Detection Based on Eigen Equation Compression," Proc. 15th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 1185-1194, 2009.
-
(2009)
Proc. 15th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining
, pp. 1185-1194
-
-
Hirose, S.1
Yamanishi, K.2
Nakata, T.3
Fukimaki, R.4
-
22
-
-
47649119832
-
A collaborative support tool for creativity learning: Idea storming cube
-
C. Huang, T. Li, H. Wang, and C. Chang, "A Collaborative Support Tool for Creativity Learning: Idea Storming Cube," Proc. IEEE Seventh Int'l Conf. Advanced Learning Technologies, pp. 31-35, 2007.
-
(2007)
Proc. IEEE Seventh Int'l Conf. Advanced Learning Technologies
, pp. 31-35
-
-
Huang, C.1
Li, T.2
Wang, H.3
Chang, C.4
-
24
-
-
4243128193
-
On clusterings: Good, bad and spectral
-
R. Kannan, S. Vempala, and A. Vetta, "On Clusterings: Good, Bad and Spectral," J. ACM, vol. 51, no. 3, pp. 497-515, 2004.
-
(2004)
J. ACM
, vol.51
, Issue.3
, pp. 497-515
-
-
Kannan, R.1
Vempala, S.2
Vetta, A.3
-
25
-
-
84863347135
-
Anomaly and signature filtering improve classifier performance for detection of suspicious access to ehrs
-
J. Kim, J. Grillo, A. Boxwala, X. Jiang, R. Mandelbaum, B. Patel, D. Mikels, S. Vinterbo, and L. Ohno-Machado, "Anomaly and Signature Filtering Improve Classifier Performance for Detection of Suspicious Access to EHRs," Proc. Ann. Symp. Am. Medical Informatics Assoc., pp. 723-731, 2011.
-
(2011)
Proc. Ann. Symp. Am. Medical Informatics Assoc.
, pp. 723-731
-
-
Kim, J.1
Grillo, J.2
Boxwala, A.3
Jiang, X.4
Mandelbaum, R.5
Patel, B.6
Mikels, D.7
Vinterbo, S.8
Ohno-Machado, L.9
-
26
-
-
0242625194
-
Role mining-revealing business roles for security administration using data mining technology
-
M. Kuhlmann, D. Shohat, and G. Schimpf, "Role Mining-Revealing Business Roles for Security Administration Using Data Mining Technology," Proc. Eighth ACM Symp. Access Control Models and Technologies, pp. 179-186, 2003.
-
(2003)
Proc. Eighth ACM Symp. Access Control Models and Technologies
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
29
-
-
52949106331
-
Statistical properties of community structure in large social and information networks
-
J. Leskovec, K. Lang, A. Dasgupta, and M. Mahoney, "Statistical Properties of Community Structure in Large Social and Information Networks," Proc. 17th Int'l Conf. World Wide Web, pp. 695-704, 2008.
-
(2008)
Proc. 17th Int'l Conf. World Wide Web
, pp. 695-704
-
-
Leskovec, J.1
Lang, K.2
Dasgupta, A.3
Mahoney, M.4
-
30
-
-
77953241534
-
-
Computing Research Repository, abs/0810.1355
-
J. Leskovec, K.J. Lang, A. Dasgupta, and M.W. Mahoney, Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters, Computing Research Repository, abs/0810.1355, 2008.
-
(2008)
Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters
-
-
Leskovec, J.1
Lang, K.J.2
Dasgupta, A.3
Mahoney, M.W.4
-
31
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection
-
DOI 10.1016/S0167-4048(02)00514-X
-
Y. Liao and V.R. Vemuri, "Use of k-Nearest Neighbor Classifier for Intrusion Detection," J. Computer Security, vol. 21, no. 5, pp. 439-448, 2002. (Pubitemid 34835644)
-
(2002)
Computers and Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
32
-
-
15244345773
-
Anonymous trust: Digital rights management using broadcast encryption
-
June
-
J. Lotspiech, S. Nusser, and F. Pestoni, "Anonymous Trust: Digital Rights Management Using Broadcast Encryption," Proc. IEEE, vol. 92, no. 6, pp. 898-902, June 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 898-902
-
-
Lotspiech, J.1
Nusser, S.2
Pestoni, F.3
-
33
-
-
79952774177
-
Learning relational policies from electronic health record access logs
-
B. Malin, S. Nyemba, and J. Paulett, "Learning Relational Policies from Electronic Health Record Access Logs," J. Biomedical Informatics, vol. 44, no. 2, pp. 333-342, 2011.
-
(2011)
J. Biomedical Informatics
, vol.44
, Issue.2
, pp. 333-342
-
-
Malin, B.1
Nyemba, S.2
Paulett, J.3
-
34
-
-
33745956063
-
Reviewing the benefits and costs of electronic health records and associated patient safety technologies
-
DOI 10.1007/s10916-005-7988-x
-
N. Menachemi and R. Brooks, "Reviewing the Benefits and Costs of Electronic Health Records and Associated Patient Safety Technologies," J. Medical Systems, vol. 30, no. 3, pp. 159-168, 2008. (Pubitemid 44060918)
-
(2006)
Journal of Medical Systems
, vol.30
, Issue.3
, pp. 159-168
-
-
Menachemi, N.1
Brooks, R.G.2
-
35
-
-
57349105655
-
Mining roles with semantic meanings
-
I. Molloy, H. Chen, T. Li, Q. Wang, N. Li, E. Bertino, S. Calo, and J. Lobo, "Mining Roles with Semantic Meanings," Proc. 13th ACM Symp. Access Control Models and Technologies, pp. 21-30, 2008.
-
(2008)
Proc. 13th ACM Symp. Access Control Models and Technologies
, pp. 21-30
-
-
Molloy, I.1
Chen, H.2
Li, T.3
Wang, Q.4
Li, N.5
Bertino, E.6
Calo, S.7
Lobo, J.8
-
36
-
-
42749099621
-
Properties of highly clustered networks
-
026121
-
M. Newman, "Properties of Highly Clustered Networks," Physical Rev. E, vol. 68, no. 026121, pp. 1-6, 2003.
-
(2003)
Physical Rev. E
, vol.68
, pp. 1-6
-
-
Newman, M.1
-
38
-
-
84994391858
-
Role-based access control on the web
-
J. Park, R. Sandhu, and G. Ahn, "Role-Based Access Control on the Web," ACM Trans. Information System Security, vol. 4, no. 1, pp. 37-71, 2001.
-
(2001)
ACM Trans. Information System Security
, vol.4
, Issue.1
, pp. 37-71
-
-
Park, J.1
Sandhu, R.2
Ahn, G.3
-
39
-
-
55549122324
-
Situation-based access control: Privacy management via modeling of patient data access scenarios
-
M. Peleg, D. Beimel, D. Dori, and Y. Denekamp, "Situation-Based Access Control: Privacy Management via Modeling of Patient Data Access Scenarios," J. Biomedical Informatics, vol. 41, no. 6, pp. 1028-1040, 2008.
-
(2008)
J. Biomedical Informatics
, vol.41
, Issue.6
, pp. 1028-1040
-
-
Peleg, M.1
Beimel, D.2
Dori, D.3
Denekamp, Y.4
-
40
-
-
34548752457
-
Incremental local outlier detection for data streams
-
DOI 10.1109/CIDM.2007.368917, 4221341, Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007
-
D. Pokrajac, A. Lazarevic, and L. Latecki, "Incremental Local Outlier Detection for Data Streams," Proc. IEEE Symp. Computational Intelligence and Data Mining, pp. 504-515, 2007. (Pubitemid 47431481)
-
(2007)
Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007
, pp. 504-515
-
-
Pokrajac, D.1
Lazarevic, A.2
Latecki, L.J.3
-
41
-
-
4243116398
-
Countering terrorism through information technology
-
R. Popp, "Countering Terrorism through Information Technology," Comm. ACM, vol. 47, no. 3, pp. 36-43, 2004.
-
(2004)
Comm. ACM
, vol.47
, Issue.3
, pp. 36-43
-
-
Popp, R.1
-
42
-
-
38149049950
-
Where can an insider attack?
-
C. Probst, R.R. Hansen, and F. Nielson, "Where Can an Insider Attack?," Proc. Workshop Formal Aspects in Security and Trust, pp. 127-142, 2006.
-
(2006)
Proc. Workshop Formal Aspects in Security and Trust
, pp. 127-142
-
-
Probst, C.1
Hansen, R.R.2
Nielson, F.3
-
43
-
-
39049126192
-
A study of access control requirements for healthcare systems based on audit trails from access logs
-
L. Røstad and O. Edsberg, "A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs," Proc. 22nd Ann. Computer Security Applications Conf., pp. 175-186, 2006.
-
(2006)
Proc. 22nd Ann. Computer Security Applications Conf.
, pp. 175-186
-
-
Røstad, L.1
Edsberg, O.2
-
44
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
DOI 10.1016/S0167-4048(02)01009-X
-
E. Schultz, "A Framework for Understanding and Predicting Insider Attacks," Computers and Security, vol. 21, no. 6, pp. 526-531, 2002. (Pubitemid 35186246)
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
45
-
-
0034244751
-
Normalized cuts and image segmentation
-
Aug.
-
J. Shi and J. Malik, "Normalized Cuts and Image Segmentation," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 8, pp. 888-905, Aug. 2002.
-
(2002)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.22
, Issue.8
, pp. 888-905
-
-
Shi, J.1
Malik, J.2
-
47
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
M. Shyu, S. Chen, K. Sarinnapakorn, and L. Chang, "A Novel Anomaly Detection Scheme Based on Principal Component Classifier," Proc. IEEE Third Foundations and New Directions of Data Mining Workshop, pp. 172-179, 2003.
-
(2003)
Proc. IEEE Third Foundations and New Directions of Data Mining Workshop
, pp. 172-179
-
-
Shyu, M.1
Chen, S.2
Sarinnapakorn, K.3
Chang, L.4
-
48
-
-
84858241555
-
-
Springer
-
S. Stolfo, S. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, and S.W. Smith, Insider Attack and Cyber Security: Beyond the Hacker. Springer, 2008.
-
(2008)
Insider Attack Cyber Security Beyond the Hacker
-
-
Stolfo, S.1
Bellovin, S.2
Hershkop, S.3
Keromytis, A.4
Sinclair, S.5
Smith, S.W.6
-
49
-
-
34548580783
-
Neighborhood formation and anomaly detection in bipartite graphs
-
DOI 10.1109/ICDM.2005.103, 1565707, Proceedings - Fifth IEEE International Conference on Data Mining, ICDM 2005
-
J. Sun, H. Qu, D. Chakrabarti, and C. Faloutsos, "Neighborhood Formation and Anomaly Detection in Bipartite Graph," Proc. IEEE Fifth Int'l Conf. Data Mining, pp. 418-425, 2005. (Pubitemid 47385721)
-
(2005)
Proceedings - IEEE International Conference on Data Mining, ICDM
, pp. 418-425
-
-
Jimeng, S.1
Huiming, Q.2
Chakrabarti, D.3
Faloutsos, C.4
-
50
-
-
84945281435
-
Enhancing effectiveness of outlier detections for low density patterns
-
J. Tang, Z. Chen, A. Fu, and D. Cheung, "Enhancing Effectiveness of Outlier Detections for Low Density Patterns," Proc. Sixth Pacific-Asia Conf. Knowledge Discovery and Data Mining, pp. 535-7548, 2002.
-
(2002)
Proc. Sixth Pacific-Asia Conf. Knowledge Discovery and Data Mining
, pp. 535-7548
-
-
Tang, J.1
Chen, Z.2
Fu, A.3
Cheung, D.4
-
51
-
-
0002841051
-
Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management
-
R. Thomas and S. Sandhu, "Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management," Proc. IFIP 11th Int'l Conf. Database Security, pp. 166-181, 1997.
-
(1997)
Proc. IFIP 11th Int'l Conf. Database Security
, pp. 166-181
-
-
Thomas, R.1
Sandhu, S.2
-
53
-
-
57349117050
-
Migrating to optimal RBAC with minimal perturbation
-
J. Vaidya, V. Atluri, Q. Guo, and N. Adam, "Migrating to Optimal RBAC with Minimal Perturbation," Proc. 13th ACM Symp. Access Control Models and Techologies, pp. 11-20, 2008.
-
(2008)
Proc. 13th ACM Symp. Access Control Models and Techologies
, pp. 11-20
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
Adam, N.4
-
54
-
-
34547237958
-
RoleMiner: Mining roles using subset enumeration
-
DOI 10.1145/1180405.1180424, 1180424, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
J. Vaidya, V. Atluri, and J. Warner, "Roleminer: Mining Roles Using Subset Enumeration," Proc. 13th ACM Conf. Computer and Comm. Security, pp. 144-153, 2006. (Pubitemid 47131364)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 144-153
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
-
55
-
-
34247540250
-
Games with a purpose
-
June
-
L. von Ahn, "Games with a Purpose," Computer, vol. 39, no. 6, pp. 96-98, June 2006.
-
(2006)
Computer
, vol.39
, Issue.6
, pp. 96-98
-
-
Von Ahn, L.1
-
56
-
-
84863373113
-
Role prediction using electronic medical record system audits
-
W. Zhang, C. Gunter, D. Liebovitz, J. Tian, and B. Malin, "Role prediction Using Electronic Medical Record System Audits," Proc. Ann. Symp. Am. Medical Informatics Assoc., pp. 858-867, 2011.
-
(2011)
Proc. Ann. Symp. Am. Medical Informatics Assoc.
, pp. 858-867
-
-
Zhang, W.1
Gunter, C.2
Liebovitz, D.3
Tian, J.4
Malin, B.5
|