Detection of Unspecified Emergencies for Controlled Information Sharing
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Access control for smarter healthcare using policy spaces , 2010, Comput. Secur..
[2] Felix Naumann,et al. A Machine Learning Approach to Foreign Key Discovery , 2009, WebDB.
[3] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[4] Ryan T. Wright,et al. Social Media and Emergency Management: Exploring State and Local Tweets , 2014, 2014 47th Hawaii International Conference on System Sciences.
[5] Hermann Hellwagner,et al. Automatic sub-event detection in emergency management using social media , 2012, WWW.
[6] Shahram Ebadollahi,et al. Anomaly detection in information streams without prior domain knowledge , 2011, IBM J. Res. Dev..
[7] Sandro Etalle,et al. Audit-Based Access Control for Electronic Health Records , 2007, Electron. Notes Theor. Comput. Sci..
[8] Achim D. Brucker,et al. Attribute-Based Encryption with Break-Glass , 2010, WISTP.
[9] David W. Chadwick,et al. How to Break Access Control in a Controlled Manner , 2006, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06).
[10] Cristina Alcaraz,et al. Towards Automatic Critical Infrastructure Protection through Machine Learning , 2013, CRITIS.
[11] Eamonn J. Keogh,et al. HOT SAX: efficiently finding the most unusual time series subsequence , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[12] P. Manjula,et al. A System for Timely and Controlled Information Sharing in Emergency Situations , 2014 .
[13] Martha Palmer,et al. Verb Semantics and Lexical Selection , 1994, ACL.
[14] David W. Chadwick,et al. How to Securely Break into RBAC: The BTG-RBAC Model , 2009, 2009 Annual Computer Security Applications Conference.
[15] Hui Xiong,et al. Secure information sharing and analysis for effective emergency management , 2008, DG.O.
[16] Achim D. Brucker,et al. Extending access control models with break-glass , 2009, SACMAT '09.
[17] Lior Rokach,et al. Detecting data misuse by applying context-based data linkage , 2010, Insider Threats '10.
[18] Dave Yates,et al. Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake , 2011, Int. J. Inf. Manag..
[19] Barbara Carminati,et al. Controlled information sharing for unspecified emergencies , 2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS).
[20] Felix Naumann,et al. Efficiently Detecting Inclusion Dependencies , 2007, 2007 IEEE 23rd International Conference on Data Engineering.