-
1
-
-
0242624597
-
From privacy promises to privacy management: A new approach for enforcing privacy throughout an enterprise
-
Virginia Beach, USA, Oct.
-
P. Ashley, M. Schunter, and C. Powers. From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise. In Proceedings of the ACM New Security Paradigms Workshop (NSPW2002), Virginia Beach, USA, Oct 2002.
-
(2002)
Proceedings of the ACM New Security Paradigms Workshop (NSPW2002)
-
-
Ashley, P.1
Schunter, M.2
Powers, C.3
-
2
-
-
84893077785
-
Obligation monitoring in policy management
-
Monterey, California, Jun
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Obligation monitoring in policy management. In Proceedings of the IEEE Third International Workshop on Policies for Distributed Systems and Networks (POLICY'02), Monterey, California, Jun 2002.
-
(2002)
Proceedings of the IEEE Third International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
3
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
Hong Kong, China
-
C. Bettini, S.Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy management and security applications. In Proceedings of the 28th International Conference on Very Large Data Bases (VLDB), Hong Kong, China, 2002.
-
(2002)
Proceedings of the 28th International Conference on Very Large Data Bases (VLDB)
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
5
-
-
84937327297
-
Conditional obligation and positive permission for agents in time
-
Dec.
-
M. A. Brown. Conditional obligation and positive permission for agents in time. Nordic Journal of Philosophical Logic, 5(2):83-111, Dec 2000.
-
(2000)
Nordic Journal of Philosophical Logic
, vol.5
, Issue.2
, pp. 83-111
-
-
Brown, M.A.1
-
7
-
-
0029714452
-
Specifying a security policy: A case study
-
Dromquinna Manor, Kenmare, County Kerry, Ireland
-
F. Cuppens and C. Saurel. Specifying a security policy: a case study. In Proceedings of the Ninth IEEE Computer Security Foundations Workshop, Dromquinna Manor, Kenmare, County Kerry, Ireland, 1996.
-
(1996)
Proceedings of the Ninth IEEE Computer Security Foundations Workshop
-
-
Cuppens, F.1
Saurel, C.2
-
8
-
-
84944048132
-
The ponder policy specification language
-
Bristol, UK
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The ponder policy specification language. In Proceedings of the 2nd International Workshop on Policies for Distributed Systems and Networks, Bristol, UK, 2001.
-
(2001)
Proceedings of the 2nd International Workshop on Policies for Distributed Systems and Networks
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
10
-
-
84888773622
-
A policy deployment model for the ponder language
-
London, UK
-
N. Dulay, E. Lupu, M. Sloman, and N. Damianou. A policy deployment model for the ponder language. In Proceedings of the IEEE/IFIP International Symposium on Integrated Network Management, London, UK, 2001.
-
(2001)
Proceedings of the IEEE/IFIP International Symposium on Integrated Network Management
-
-
Dulay, N.1
Lupu, E.2
Sloman, M.3
Damianou, N.4
-
16
-
-
0011795795
-
Provisional authorizations
-
S. Jajodia, M. Kudo, and V. Subrahmanian. Provisional authorizations. E-Commerce Security and Privacy, 57(1):133-159, 2001.
-
(2001)
E-commerce Security and Privacy
, vol.57
, Issue.1
, pp. 133-159
-
-
Jajodia, S.1
Kudo, M.2
Subrahmanian, V.3
-
17
-
-
84958662051
-
Formally specifying temporal constraints and error recovery
-
San Diego, California
-
S. Kent, T. Maibaum, and W. Quirk. Formally specifying temporal constraints and error recovery. In Proceedings of the RE93 - 1st Intl. IEEE Symp. on Requirements Engineering, pages 208-215, San Diego, California, 1996.
-
(1996)
Proceedings of the RE93 - 1st Intl. IEEE Symp. on Requirements Engineering
, pp. 208-215
-
-
Kent, S.1
Maibaum, T.2
Quirk, W.3
-
20
-
-
84936864635
-
Discretionary enforcement of electronic contracts
-
Lausanne, Switzerland, Sep.
-
Z. Milosevic, A. Josang, T. Dimitrakios, and M. Patton. Discretionary enforcement of electronic contracts. In Proceedings of the 6th IEEE Conf. on Enterprise Distributed Object Computing (EDOC-2002), Lausanne, Switzerland, Sep 2002.
-
(2002)
Proceedings of the 6th IEEE Conf. on Enterprise Distributed Object Computing (EDOC-2002)
-
-
Milosevic, Z.1
Josang, A.2
Dimitrakios, T.3
Patton, M.4
-
21
-
-
0022334918
-
Ensuring integrity by adding obligations to privileges
-
Klagenfurt/Velden, Austria, Aug.
-
N. Minsky and A. D. Lockman. Ensuring integrity by adding obligations to privileges. In Proceedings of the 8th International Conference on Sofware Engineering, pages 92-102, Klagenfurt/Velden, Austria, Aug 1985.
-
(1985)
Proceedings of the 8th International Conference on Sofware Engineering
, vol.8
, pp. 92-102
-
-
Minsky, N.1
Lockman, A.D.2
-
22
-
-
0000788149
-
Law-governed interaction: A coordination & control mechanism for heterogeneous distributed systems
-
July
-
N. Minsky and V. Ungureanu. Law-governed interaction: A coordination & control mechanism for heterogeneous distributed systems. ACM Trans. Software Eng. and Methodology, 9(3):273-305, July 2000.
-
(2000)
ACM Trans. Software Eng. and Methodology
, vol.9
, Issue.3
, pp. 273-305
-
-
Minsky, N.1
Ungureanu, V.2
-
23
-
-
84944060122
-
Contract representation for run-time monitoring and enforcement
-
California, USA, June
-
C. Molina-Jimenez, S. Shrivastava, E. Solaiman, and J. Warne. Contract representation for run-time monitoring and enforcement. In Proceedings of the IEEE Conf. on Electronic Commerce (CEC), California, USA, June 2003.
-
(2003)
Proceedings of the IEEE Conf. on Electronic Commerce (CEC)
-
-
Molina-Jimenez, C.1
Shrivastava, S.2
Solaiman, E.3
Warne, J.4
-
25
-
-
0003076271
-
Contrary-to-duty obligations
-
H. Prakken and M. Sergot Contrary-to-duty obligations. Studia Logica, 57(1):91-115, 1996.
-
(1996)
Studia Logica
, vol.57
, Issue.1
, pp. 91-115
-
-
Prakken, H.1
Sergot, M.2
-
26
-
-
35248873970
-
Enforcing obligation with security monitors
-
Xi'an, China
-
C. N. Ribeiro, A. Zúquete, P. Ferreira, and P. Guedes. Enforcing obligation with security monitors. In Proceedings of the Third International Conference on Information and Communication Security (ICICS'2001), Xi'an, China, 2001.
-
(2001)
Proceedings of the Third International Conference on Information and Communication Security (ICICS'2001)
-
-
Ribeiro, C.N.1
Zúquete, A.2
Ferreira, P.3
Guedes, P.4
-
27
-
-
84945150402
-
SPL: An access control language for security policies with complex constraints
-
San Diego, California, Feb
-
C. N. Ribeiro, A. Zúquete, P. Ferreira, and P. Guedes. SPL: An access control language for security policies with complex constraints. In Proceedings of the Network and Distributed System Security Symposium, San Diego, California, Feb 2001.
-
(2001)
Proceedings of the Network and Distributed System Security Symposium
-
-
Ribeiro, C.N.1
Zúquete, A.2
Ferreira, P.3
Guedes, P.4
-
33
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
T. Y. C. WOO and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2,3): 107-136, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
34
-
-
4143074723
-
A logical specification for usage control
-
New York, USA
-
X. Zhang, J. Park, F. Parisi-Presicce, and R. Sandhu. A logical specification for usage control. In Proceedings of the Symposium on Access Control Models and Technologies, New York, USA, 2004.
-
(2004)
Proceedings of the Symposium on Access Control Models and Technologies
-
-
Zhang, X.1
Park, J.2
Parisi-Presicce, F.3
Sandhu, R.4
|