Extracting Permission-Based Specifications from a Sequential Java Program.
Ayesha SadiqYuan-Fang LiSea LingIjaz AhmedPublished in: ICECCS (2016)
Keyphrases
- access control
- automatically extracted
- automatic extraction
- delay insensitive
- third party
- artificial intelligence
- security policies
- feature selection
- multi agent
- evolutionary algorithm
- hidden markov models
- multiscale
- image sequences
- high level
- decision trees
- finite state machines
- formal specification
- genetic algorithm