-
1
-
-
33947692518
-
-
at
-
2 proof tools at http://www.cs.ru.nl/paw
-
2 Proof Tools
-
-
-
4
-
-
0037703469
-
E-p3p privacy policies and privacy authorization
-
In: Samarati, P. (ed.) ACM Press
-
Ashley, P., Hada, S., Karjoth, G., Schunter, M.: E-p3p privacy policies and privacy authorization. In: Samarati, P. (ed.) Proceedings of the ACM workshop on Privacy in the Electronic Society (WPES 2002), pp. 103-109. ACM Press (2002)
-
(2002)
Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES 2002)
, pp. 103-109
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Schunter, M.4
-
5
-
-
0036086099
-
Constrained delegation
-
In: Abadi, M., Bellovin, S.M. (eds.) IEEE Computer Society Press
-
Bandmann, O.L., Firozabadi, B.S., Dam, M.: Constrained delegation. In: Abadi, M., Bellovin, S.M. (eds.) Proceedings of the Symposium on Security and Privacy (S&P), pp. 131-140. IEEE Computer Society Press (2002)
-
(2002)
Proceedings of the Symposium on Security and Privacy (S&P)
, pp. 131-140
-
-
Bandmann, O.L.1
Firozabadi, B.S.2
Dam, M.3
-
6
-
-
4944223328
-
Cassandra: Flexible trust management, applied to electronic health records
-
In: Focardi, R. (ed.) IEEE Computer Society Press
-
BeckeF, M.Y., Sewell, P.: Cassandra: flexible trust management, applied to electronic health records. In: Focardi, R. (ed.) Proceedings of the Computer Security Foundations Workshop (CSFW), pp. 139-154. IEEE Computer Society Press (2004)
-
(2004)
Proceedings of the Computer Security Foundations Workshop (CSFW)
, pp. 139-154
-
-
Becker, M.Y.1
Sewell, P.2
-
7
-
-
2342562768
-
Leantap: Lean tableau-based deduction
-
Beckert B. and Posegga J. (1995). leantap: Lean tableau-based deduction. J. Autom. Reasoning 15(3): 339-358
-
(1995)
J. Autom. Reasoning
, vol.15
, Issue.3
, pp. 339-358
-
-
Beckert, B.1
Posegga, J.2
-
8
-
-
0029700344
-
Decentralized trust management
-
In: IEEE Computer Society Press
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the Symposium on Security and Privacy (S&P), pp. 164-173. IEEE Computer Society Press (1996)
-
(1996)
Proceedings of the Symposium on Security and Privacy (S&P)
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
9
-
-
33745005053
-
An audit logic for accountability
-
In: Sahai, A., Winsborough, W.H. (eds.) IEEE Computer Society Press
-
Cederquist, J.G., Corin, R.J., Dekker, M.A.C., Etalle, S., den Hartog, J.I.: An audit logic for accountability. In: Sahai, A., Winsborough, W.H. (eds.) Proceedings of the International Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 34-43. IEEE Computer Society Press (2005)
-
(2005)
Proceedings of the International Workshop on Policies for Distributed Systems and Networks (POLICY)
, pp. 34-43
-
-
Cederquist, J.G.1
Corin, R.J.2
Dekker, M.A.C.3
Etalle, S.4
den Hartog, J.I.5
-
10
-
-
70449635348
-
Secure audit logging with tamper-resistant hardware
-
In: Gritzalis, D., S.D.C., Samarati, P., Katsikas, S.K. (eds.) Athens, Greece Kluwer Academic, Dordrecht
-
Chong, C.N., Peng, Z., Hartel, P.H.: Secure audit logging with tamper-resistant hardware. In: Gritzalis, D., S.D.C., Samarati, P., Katsikas, S.K. (eds.) 18th IFIP TC11 International Conference on Information Security and Privacy in the Age of Uncertainty (SEC), Athens, Greece, pp. 73-84. Kluwer Academic, Dordrecht (2003)
-
(2003)
18th IFIP TC11 International Conference on Information Security and Privacy in the Age of Uncertainty (SEC)
, pp. 73-84
-
-
Chong, C.N.1
Peng, Z.2
Hartel, P.H.3
-
11
-
-
84902437419
-
A logic for auditing accountability in decentralized systems
-
In: Dimitrakos, T., Martinelli, F. (eds.) Springer, Berlin
-
Corin, R., Etalle, S., den Hartog, J.I., Lenzini, G., Staicu, I.: A logic for auditing accountability in decentralized systems. In: Dimitrakos, T., Martinelli, F. (eds.) Proceedings of the IFIP Workshop on Formal Aspects in Security and Trust (FAST), vol. 173, pp. 187-202. Springer, Berlin (2004)
-
(2004)
Proceedings of the IFIP Workshop on Formal Aspects in Security and Trust (FAST)
, vol.173
, pp. 187-202
-
-
Corin, R.1
Etalle, S.2
den Hartog, J.I.3
Lenzini, G.4
Staicu, I.5
-
13
-
-
18944365905
-
Eigenvariables, bracketing and the decidability of positive minimal intuitionistic logic
-
Dowek, G., Jiang, Y.: Eigenvariables, bracketing and the decidability of positive minimal intuitionistic logic. Electr. Notes Theor. Comput. Sci. 85(7) (2003)
-
(2003)
Electr. Notes Theor. Comput. Sci.
, vol.85
, Issue.7
-
-
Dowek, G.1
Jiang, Y.2
-
14
-
-
33750280592
-
A linear logic of authorization and knowledge
-
In: Springer, Berlin
-
Garg, D., Bauer, L., Bowers, K., Pfenning, F., Reiter, M.: A linear logic of authorization and knowledge. In: Proceedings of the European Symposium On Research In Computer Security (ESORICS). Springer, Berlin (2006)
-
(2006)
Proceedings of the European Symposium On Research In Computer Security (ESORICS)
-
-
Garg, D.1
Bauer, L.2
Bowers, K.3
Pfenning, F.4
Reiter, M.5
-
18
-
-
33947625881
-
-
Technical report, National Institute of Standards and Technology
-
Hu, V., Ferraiolo, D., Kuhn, D.: Assessment of access control systems - NIST interagency report. Technical report, National Institute of Standards and Technology (2006)
-
(2006)
Assessment of Access Control Systems - NIST Interagency Report
-
-
Hu, V.1
Ferraiolo, D.2
Kuhn, D.3
-
19
-
-
3142533901
-
Logical design of audit information in relational databases
-
In: IEEE Computer Society Press
-
Jajodia, S., Gadia, S., Bhargava, G.: Logical design of audit information in relational databases. In: Information Security: An integrated Collection of Essays, pp. 585-595. IEEE Computer Society Press (1995)
-
(1995)
Information Security: An Integrated Collection of Essays
, pp. 585-595
-
-
Jajodia, S.1
Gadia, S.2
Bhargava, G.3
-
20
-
-
2342618084
-
Platform for enterprise privacy practices: Privacy-enabled management of customer data
-
Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: Privacy-enabled management of customer data. Privacy Enhancing Technologies (2002)
-
(2002)
Privacy Enhancing Technologies
-
-
Karjoth, G.1
Schunter, M.2
Waidner, M.3
-
22
-
-
0037974359
-
Datalog with constraints: A foundation for trust management languages
-
In: Dahl, V., Wadler, P. (eds.)
-
Li, N., Mitchell, J.: Datalog with constraints: A foundation for trust management languages. In: Dahl, V., Wadler, P. (eds.) Proceedings of the International Symposium on Practical Aspects of Declarative Languages (PADL) (2003)
-
(2003)
Proceedings of the International Symposium on Practical Aspects of Declarative Languages (PADL)
-
-
Li, N.1
Mitchell, J.2
-
23
-
-
0036085965
-
Design of a role-based trust-management framework
-
In: Abadi, M., Bellovin, S.M. (eds.) IEEE Computer Society Press
-
Li, N., Mitchell, J., Winsborough, W.: Design of a role-based trust-management framework. In: Abadi, M., Bellovin, S.M. (eds.) Proceedings of the Symposium on Research in Security and Privacy (S&P), pp. 114-130. IEEE Computer Society Press (2002)
-
(2002)
Proceedings of the Symposium on Research in Security and Privacy (S&P)
, pp. 114-130
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
24
-
-
33947670222
-
A model of accountability, confidentiality and override for healthcare and other applications
-
Longstaff, J.J., Lockyer, M.A., Thick, M.G.: A model of accountability, confidentiality and override for healthcare and other applications. In: Proceedings of the Workshop on Role-based Access Control (RBAC)
-
Proceedings of the Workshop on Role-based Access Control (RBAC)
-
-
Longstaff, J.J.1
Lockyer, M.A.2
Thick, M.G.3
-
25
-
-
0004118855
-
Compiling with proofs
-
Ph.D. thesis, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA
-
Necula, G.C.: Compiling with proofs. Ph.D. thesis, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA (1998)
-
(1998)
-
-
Necula, G.C.1
-
27
-
-
84893070616
-
Originator control in usage control
-
In: Lobo, J., Dulay, N. (eds.) IEEE Computer Society, Washington, DC, USA
-
Park, J., Sandhu, R.: Originator control in usage control. In: Lobo, J., Dulay, N. (eds.) Proceedings of the International Workshop on Policies for Distributed Systems and Networks (POLICY), p. 60. IEEE Computer Society, Washington, DC, USA (2002)
-
(2002)
Proceedings of the International Workshop on Policies for Distributed Systems and Networks (POLICY)
, pp. 60
-
-
Park, J.1
Sandhu, R.2
-
30
-
-
35448990873
-
System description: Twelf - A meta-logical framework for deductive systems
-
In: Ganzinger, H. (ed.) Springer, Berlin
-
Pfenning, F., Schürmann, C.: System description: Twelf - a meta-logical framework for deductive systems. In: Ganzinger, H. (ed.) Proceedings of the International Conference on Automated Deduction (CADE), pp. 202-206. Springer, Berlin (1999)
-
(1999)
Proceedings of the International Conference on Automated Deduction (CADE)
, pp. 202-206
-
-
Pfenning, F.1
Schürmann, C.2
-
31
-
-
84860699599
-
Discretionary overriding of access control in the privilege calculus
-
In: Dimitrakos, T., Martinelli, F. (eds.) Springer, Berlin
-
Rissanen, E., Firozabadi, B.S., Sergot, M.J.: Discretionary overriding of access control in the privilege calculus. In: Dimitrakos, T., Martinelli, F. (eds.) Proceedings of the 2nd IFIP Workshop on Formal Aspects in Security and Trust (FAST), pp. 219-232. Springer, Berlin (2004)
-
(2004)
Proceedings of the 2nd IFIP Workshop on Formal Aspects in Security and Trust (FAST)
, pp. 219-232
-
-
Rissanen, E.1
Firozabadi, B.S.2
Sergot, M.J.3
-
32
-
-
35248873795
-
Usage control: A vision for next generation access control
-
In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) LNCS Springer, Berlin
-
Sandhu, R., Park, J.: Usage control: A vision for next generation access control. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) Proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security MMM-ACNS. LNCS, vol. 2776, pp. 17-31. Springer, Berlin (2003)
-
(2003)
Proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security MMM-ACNS
, vol.2776
, pp. 17-31
-
-
Sandhu, R.1
Park, J.2
-
33
-
-
0028513932
-
Access control: Principles and practice
-
Sandhu R. and Samarati P. (1994). Access control: Principles and practice. IEEE Commun. Mag. 32(9): 40-48
-
(1994)
IEEE Commun. Mag.
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
34
-
-
0000052619
-
Authentication, access control and audit
-
Sandhu R. and Samarati P. (1996). Authentication, access control and audit. ACM Comput. Surv. 28(1): 241-243
-
(1996)
ACM Comput. Surv.
, vol.28
, Issue.1
, pp. 241-243
-
-
Sandhu, R.1
Samarati, P.2
-
35
-
-
11944249167
-
Reputation-based trust management
-
Shmatikov V. and Talcott C.L. (2005). Reputation-based trust management. J. Comput. Secur. 13(1): 167-190
-
(2005)
J. Comput. Secur.
, vol.13
, Issue.1
, pp. 167-190
-
-
Shmatikov, V.1
Talcott, C.L.2
-
36
-
-
0003887053
-
-
Szabo E.M. ed. North Holland, Amsterdam
-
Szabo E.M. ed. (1969). The Collected of Gerhard Gentzen. North Holland, Amsterdam
-
(1969)
The Collected of Gerhard Gentzen
-
-
-
37
-
-
33947646688
-
The European Parliament and the Council of the European Union: UE DIRECTIVE 2002/58/EC on privacy and electronic communications
-
The European Parliament and the Council of the European Union: UE DIRECTIVE 2002/58/EC on privacy and electronic communications. Official Journal of the European Union. http://europa.eu.int/eur-lex/pri/en/oj/ dat/2002/l_201/l_20120020731en00370047.pdf (2002)
-
(2002)
Official Journal of the European Union
-
-
-
39
-
-
34547315631
-
Words are not enough: Sentence level natural language watermarking
-
In: ACM Press
-
Topkara, M., TopSara, U., Atallah, M.J.: Words are not enough: sentence level natural language watermarking. In: Proceedings of the International workshop on Contents Protection and Security (MCPS), pp. 37-46. ACM Press (2006)
-
(2006)
Proceedings of the International Workshop on Contents Protection and Security (MCPS)
, pp. 37-46
-
-
Topkara, M.1
Topkara, U.2
Atallah, M.J.3
-
40
-
-
33947627944
-
-
U.S. Securities and Exchange Commission: Sarbanes-oxley act
-
U.S. Securities and Exchange Commission: Sarbanes-oxley act (2002)
-
(2002)
-
-
-
41
-
-
0141929307
-
XrML: Extensible rights markup language
-
In: Kudo, M. (ed.) ACM Press
-
Wang, X., Lao, G., De Martini, T., Reddy, H., Nguyen, M., Valenzuela, E.: XrML: eXtensible rights markup language. In: Kudo, M. (ed.) Proceedings of the Workshop on XML Security (XMLSEC), pp. 71-79. ACM Press (2002)
-
(2002)
Proceedings of the Workshop on XML Security (XMLSEC)
, pp. 71-79
-
-
Wang, X.1
Lao, G.2
De Martini, T.3
Reddy, H.4
Nguyen, M.5
Valenzuela, E.6
-
42
-
-
4944234642
-
By reason and authority: A system for authorization of proof-carrying code
-
In: Focardi, R. (ed.) IEEE Computer Society Press
-
Whitehead, N., AbadA, M., Necula, G.C.: By reason and authority: a system for authorization of proof-carrying code. In: Focardi, R. (ed.) Proceedings of the Computer Security Foundations Workshop (CSFW), pp. 236-250. IEEE Computer Society Press (2004)
-
(2004)
Proceedings of the Computer Security Foundations Workshop (CSFW)
, pp. 236-250
-
-
Whitehead, N.1
Abadi, M.2
Necula, G.C.3
|