https://pdfbox.apache.org/index.html 2. Federal information security management act of 2002. Title III of the E- Government Act of, 2002. ,
Generating typed dependency parses from phrase structure parses, Proceedings of LREC, pp.449-454, 2006. ,
Microsoft research paraphrase corpus, 2005. ,
Learning from Little: Comparison of Classifiers Given Little Training, European Conference on Principles of Data Mining and Knowledge Discovery, pp.161-172, 2004. ,
DOI : 10.1007/978-3-540-30116-5_17
Mining Roles from Web Application Usage Patterns, International Conference on Trust, Privacy and Security in Digital Business, pp.125-137, 2011. ,
DOI : 10.1145/1805974.1805983
The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009. ,
DOI : 10.1145/1656274.1656278
Applying role based access control and genetic algorithms to insider threat detection, Proceedings of the 44th annual southeast regional conference on , ACM-SE 44, pp.790-791, 2006. ,
DOI : 10.1145/1185448.1185638
Guide to attribute based access control (abac) definition and considerations (draft), NIST special publication, vol.800, issue.162, 2013. ,
DOI : 10.6028/nist.sp.800-162
Text categorization with Support Vector Machines: Learning with many relevant features, Machine learning: ECML-98 pp, pp.137-142, 1998. ,
DOI : 10.1007/BFb0026683
URL : http://ranger.uta.edu/~alp/ix/readings/SVMsforTextCategorization.pdf
AUTOREB, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.530-541, 2015. ,
DOI : 10.1007/978-3-642-39235-1_3
Automatic analysis of syntactic complexity in second language writing, International Journal of Corpus Linguistics, vol.15, issue.4, pp.474-496, 2010. ,
DOI : 10.1075/ijcl.15.4.02lu
Probabilistic information retrieval. Introduction to Information Retrieval pp, pp.220-235, 2009. ,
Evolutionary Inference of Attribute-Based Access Control Policies, International Conference on Evolutionary Multi-Criterion Optimization, pp.351-365, 2015. ,
DOI : 10.1007/978-3-319-15934-8_24
Towards a Top-down Policy Engineering Framework for Attribute-based Access Control, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies , SACMAT '17 Abstracts, 2017. ,
DOI : 10.1109/TDSC.2014.2369048
Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques, IFIP International Conference on Information Security Theory and Practice, pp.137-152, 2015. ,
DOI : 10.1145/2393596.2393608
URL : https://hal.archives-ouvertes.fr/hal-01442558
Towards an Automatic Top-down Role Engineering Approach Using Natural Language Processing Techniques, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT '15, pp.157-160, 2015. ,
DOI : 10.1145/2393596.2393608
On discriminative vs. generative classifiers: A comparison of logistic regression and naive bayes Advances in neural information processing systems 2, pp.841-848, 2002. ,
Syntactic Complexity Measures and their Relationship to L2 Proficiency: A Research Synthesis of College-level L2 Writing, Applied Linguistics, vol.24, issue.4, pp.492-518, 2003. ,
DOI : 10.1093/applin/24.4.492
Knowledge derived from wikipedia for computing semantic relatedness, J. Artif. Intell. Res.(JAIR), vol.30, pp.181-212, 2007. ,
Semilar: The semantic similarity toolkit, ACL (Conference System Demonstrations, pp.163-168, 2013. ,
Relation extraction for inferring access control rules from natural language artifacts, Proceedings of the 30th Annual Computer Security Applications Conference on, ACSAC '14, pp.366-375, 2014. ,
DOI : 10.1016/S0950-5849(03)00100-9
Implementing database access control policy from unconstrained natural language text, 2013 35th International Conference on Software Engineering (ICSE), 2015. ,
DOI : 10.1109/ICSE.2013.6606716
Mining the Web for Synonyms: PMI-IR versus LSA on TOEFL, European Conference on Machine Learning, pp.491-502, 2001. ,
DOI : 10.1007/3-540-44795-4_42
Cyberchair: A web-based groupware application to facilitate the paper reviewing process. arXiv preprint arXiv, pp.1206-1833, 2012. ,
Second language development in writing: Measures of fluency, accuracy, & complexity, 1998. ,
Automated extraction of security policies from natural-language software documents, Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE '12, p.12, 2012. ,
DOI : 10.1145/2393596.2393608
Mining Attribute-Based Access Control Policies from Logs, IFIP Annual Conference on Data and Applications Security and Privacy, pp.276-291, 2014. ,
DOI : 10.1007/978-3-662-43936-4_18
URL : https://hal.archives-ouvertes.fr/hal-01284862
Mining Attribute-Based Access Control Policies, IEEE Transactions on Dependable and Secure Computing, vol.12, issue.5, pp.533-545, 2015. ,
DOI : 10.1109/TDSC.2014.2369048
URL : https://hal.archives-ouvertes.fr/hal-01284862