-
3
-
-
0037703469
-
E-p3p privacy policies and privacy authorization
-
P. Samarati, editor, ACM Press
-
P. Ashley, S. Hada, G. Karjoth, and M. Schunter. E-p3p privacy policies and privacy authorization. In P. Samarati, editor, Proc. of the ACM workshop on Privacy in the Electronic Society (WPES 2002), pages 103-109. ACM Press, 2002.
-
(2002)
Proc. of the ACM Workshop on Privacy in the Electronic Society (WPES 2002)
, pp. 103-109
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Schunter, M.4
-
4
-
-
0041524664
-
A logical framework for reasoning about access control models
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. ACM Transactions on Information and System Security (TISSEC), pages 71-127, 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
5
-
-
84944451446
-
LicenseScript: A novel digital rights language and its semantics
-
K. Ng, C. Busch, and P. Nesi, editors, IEEE Computer Society Press
-
C. N. Chong, R. Corin, S. Etalle, P. H. Hartel, W. Jonker, and Y. W. Law. LicenseScript: A novel digital rights language and its semantics. In K. Ng, C. Busch, and P. Nesi, editors, 3rd Int. Conf. on Web Delivering of Music (WEDELMUSIC), pages 122-129. IEEE Computer Society Press, 2003.
-
(2003)
3rd Int. Conf. on Web Delivering of Music (WEDELMUSIC)
, pp. 122-129
-
-
Chong, C.N.1
Corin, R.2
Etalle, S.3
Hartel, P.H.4
Jonker, W.5
Law, Y.W.6
-
6
-
-
84902437419
-
A logic for auditing accountability in decentralized systems
-
T. Dimitrakos and F. Martinelli, editors, page to appear. Springer Verlag
-
R. Corin, S. Etalle, J. I. den Hartog, O. Lenzini, and I. Staicu. A logic for auditing accountability in decentralized systems. In T. Dimitrakos and F. Martinelli, editors, Proc. of the second IFIP Workshop on Formal Aspects in Security and Trust (FAST), volume 173, page to appear. Springer Verlag, 2004.
-
(2004)
Proc. of the Second IFIP Workshop on Formal Aspects in Security and Trust (FAST)
, vol.173
-
-
Corin, R.1
Etalle, S.2
Den Hartog, J.I.3
Lenzini, O.4
Staicu, I.5
-
8
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
J. Peckham, editor, ACM Press
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In J. Peckham, editor, SIGMOD 1997, Proc. International Conference on Management of Data, pages 474-485. ACM Press, 1997.
-
(1997)
SIGMOD 1997, Proc. International Conference on Management of Data
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
10
-
-
0004118855
-
-
PhD thesis, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA
-
G. C. Necula. Compiling with Proofs. PhD thesis, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, 1998.
-
(1998)
Compiling with Proofs
-
-
Necula, G.C.1
-
12
-
-
0002474842
-
Logic programming in the LF logical frame-work
-
G. Huet and G. Plotkin, editors, Cambridge University Press
-
F. Pfenning. Logic programming in the LF logical frame-work. In G. Huet and G. Plotkin, editors, Logical Frame-works, pages 149-181. Cambridge University Press, 1991.
-
(1991)
Logical Frame-works
, pp. 149-181
-
-
Pfenning, F.1
-
14
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
R. Focardi and R. Gorrieri, editors, Springer-Verlag
-
P. Samarati and S. De Capitani di Vimercati. Access control: policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS, volume 2171, pages 137-196. Springer-Verlag, 2001.
-
(2001)
Foundations of Security Analysis and Design, LNCS
, vol.2171
, pp. 137-196
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
15
-
-
35248873795
-
Usage control: A vision for next generation access control
-
V. Gorodetsky, L. J. Popyack, and V. A. Skormin, editors, volume 2776 of LNCS, Springer-Verlag
-
R. Sandhu and J. Park. Usage control: A vision for next generation access control. In V. Gorodetsky, L. J. Popyack, and V. A. Skormin, editors, Proc. Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security MMM-ACNS, volume 2776 of LNCS, pages 17-31. Springer-Verlag, 2003.
-
(2003)
Proc. Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security MMM-ACNS
, pp. 17-31
-
-
Sandhu, R.1
Park, J.2
-
16
-
-
0028513932
-
Access control: Principles and practice
-
R. Sandhu and P. Samarati. Access control: Principles and practice. IEEE Communications Magazine, 32(9):40-48, 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
18
-
-
0141929307
-
XrML: EXtensible rights markup language
-
M. Kudo, editor, ACM Press
-
X. Wang, G. Lao, T. De Martini, H. Reddy, M. Nguyen, and E. Valenzuela. XrML: eXtensible rights markup language. In M. Kudo, editor, Proc. 2002 ACM workshop on XML security (XMLSEC-02), pages 71-79. ACM Press, 2002.
-
(2002)
Proc. 2002 ACM Workshop on XML Security (XMLSEC-02)
, pp. 71-79
-
-
Wang, X.1
Lao, G.2
De Martini, T.3
Reddy, H.4
Nguyen, M.5
Valenzuela, E.6
|