-
2
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. R. Adam and J. C. Worthmann, Security-control methods for statistical databases: A comparative study, CSUR 21(4) (1989) 515-556.
-
(1989)
CSUR
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Worthmann, J.C.2
-
3
-
-
0242674432
-
Hippocratic databases
-
Morgan Kaufmann
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic databases, in Proc. VLDB'02, Morgan Kaufmann, 2002, pp. 143-154.
-
(2002)
Proc. VLDB'02
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
4
-
-
34249001436
-
The Use of Goals to Extract Privacy and Security Requirements from Policy Statements
-
Technical Report TR.-2003-17, NCSU Computer Science, September
-
A. I. Anton, D. Bolchini, and Q. He, The Use of Goals to Extract Privacy and Security Requirements from Policy Statements, Technical Report TR.-2003-17, NCSU Computer Science, September 2003.
-
(2003)
-
-
Anton, A.I.1
Bolchini, D.2
He, Q.3
-
5
-
-
17744389340
-
A requirements taxonomy for reducing Web site privacy vulnerabilities
-
A. I. Antón and J. B. Earp, A requirements taxonomy for reducing Web site privacy vulnerabilities, Requirements Eng. J. 9(3) (2004) 169-185.
-
(2004)
Requirements Eng. J
, vol.9
, Issue.3
, pp. 169-185
-
-
Antón, A.I.1
Earp, J.B.2
-
6
-
-
2442516401
-
Efficient comparison of enterprise privacy policies
-
ACM Press
-
M. Backes, G. Karjoth, W. Bagga, and M. Schunter, Efficient comparison of enterprise privacy policies, in Proc. SAC'04, ACM Press, 2004, pp. 375-382.
-
(2004)
Proc. SAC'04
, pp. 375-382
-
-
Backes, M.1
Karjoth, G.2
Bagga, W.3
Schunter, M.4
-
7
-
-
0142157015
-
A toolkit for managing enterprise privacy policies
-
Proc. ESORICS'03, Springer
-
M. Backes, B. Pfitzmann, and M. Schunter, A toolkit for managing enterprise privacy policies, in Proc. ESORICS'03, LNCS 2808, Springer, 2003, pp. 162-180.
-
(2003)
LNCS
, vol.2808
, pp. 162-180
-
-
Backes, M.1
Pfitzmann, B.2
Schunter, M.3
-
8
-
-
0003400251
-
Secure Computer System: Unified Exposition and MULTICS Interpretation
-
Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA
-
D. E. Bell and L. J. LaPadula, Secure Computer System: Unified Exposition and MULTICS Interpretation, Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA, 1976.
-
(1976)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
9
-
-
3142750497
-
TROPOS: An agent-oriented software development methodology
-
P. Bresciani, P. Giorgini, F. Giunchiglia, J. Mylopoulos, and A. Perini, TROPOS: An agent-oriented software development methodology, JAAMAS 8(3) (2004) 203-236.
-
(2004)
JAAMAS
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
10
-
-
19944414458
-
Purpose-Based Access Control for Privacy Protection in Relational Database Systems
-
Technical Report 2004-52, Purdue University
-
J.-W. Byun, E. Bertino, and N. Li, Purpose-Based Access Control for Privacy Protection in Relational Database Systems, Technical Report 2004-52, Purdue University, 2004.
-
(2004)
-
-
Byun, J.-W.1
Bertino, E.2
Li, N.3
-
11
-
-
30644474612
-
Purpose based access control of complex data for privacy protection
-
ACM Press
-
J.-W. Byun, E. Bertino, and N. Li, Purpose based access control of complex data for privacy protection, in Proc. SACMAT'05, ACM Press, 2005, pp. 102-110.
-
(2005)
Proc. SACMAT'05
, pp. 102-110
-
-
Byun, J.-W.1
Bertino, E.2
Li, N.3
-
12
-
-
0013243382
-
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, W3C Recommendation
-
April
-
L. Cranor, M. Langheinrich, M. Marchiori, and J. Reagle, The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, W3C Recommendation, April 2002.
-
(2002)
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Reagle, J.4
-
13
-
-
84880846309
-
Aggregate functions in disjunctive logic programming: Semantics, complexity, and implementation in DLV
-
Morgan Kaufmann
-
T. Dell'Armi, W. Faber, G. Ielpa, N. Leone, and G. Pfeifer, Aggregate functions in disjunctive logic programming: Semantics, complexity, and implementation in DLV, in Proc. IJCAI'03, Morgan Kaufmann, 2003, pp. 847-852.
-
(2003)
Proc. IJCAI'03
, pp. 847-852
-
-
Dell'Armi, T.1
Faber, W.2
Ielpa, G.3
Leone, N.4
Pfeifer, G.5
-
14
-
-
84937399920
-
Issues in discretionary access control
-
IEEE Press
-
D. Downs, J. Rub, K. Kung, and C. Jordan, Issues in discretionary access control, in Proc. Symp. on Sec. and Privacy, IEEE Press, 1985, pp. 208-218.
-
(1985)
Proc. Symp. on Sec. and Privacy
, pp. 208-218
-
-
Downs, D.1
Rub, J.2
Kung, K.3
Jordan, C.4
-
15
-
-
35048857793
-
Filling the gap between requirements engineering and public key/trust management infrastructures
-
Proc. EuroPKI'04, Springer
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, Filling the gap between requirements engineering and public key/trust management infrastructures, in Proc. EuroPKI'04, LNCS 3093, Springer, 2004, pp. 98-111.
-
(2004)
LNCS
, vol.3093
, pp. 98-111
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
16
-
-
35048841167
-
Requirements engineering meets trust management: Model, methodology, and reasoning
-
Proc. i'Trust'04, Springer
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, Requirements engineering meets trust management: Model, methodology, and reasoning, in Proc. i'Trust'04, LNCS 2995, Springer, 2004, pp. 176-190.
-
(2004)
LNCS
, vol.2995
, pp. 176-190
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
17
-
-
24944578244
-
Modelling social and individual trust in requirements engineering methodologies
-
Proc. iTrust'05, Springer
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, Modelling social and individual trust in requirements engineering methodologies, in Proc. iTrust'05, LNCS 3477, Springer, 2005, pp. 161-176.
-
(2005)
LNCS
, vol.3477
, pp. 161-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
18
-
-
24344462080
-
A framework for modeling privacy requirements in role engineering
-
Q. He and A. I. Anton, A framework for modeling privacy requirements in role engineering, in Proc. REFSQ'03, 2003, pp. 137-146.
-
(2003)
Proc. REFSQ'03
, pp. 137-146
-
-
He, Q.1
Anton, A.I.2
-
19
-
-
84957805078
-
Platform for enterprise privacy practices: Privacy-enabled management of customer data
-
Proc. PET'02, Springer
-
G. Karjoth, M. Schunter, and M. Waidner, Platform for enterprise privacy practices: Privacy-enabled management of customer data, in Proc. PET'02, LNCS 2482, Springer, 2002, pp. 69-84.
-
(2002)
LNCS
, vol.2482
, pp. 69-84
-
-
Karjoth, G.1
Schunter, M.2
Waidner, M.3
-
20
-
-
85102591607
-
Limiting disclosure in hippocratic databases
-
Morgan Kaufmann
-
K. LeFevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu, and D. J. DeWitt, Limiting disclosure in hippocratic databases, in Proc. VLDB'04, Morgan Kaufmann, 2004, pp. 108-119.
-
(2004)
Proc. VLDB'04
, pp. 108-119
-
-
LeFevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.J.6
-
21
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
IEEE Press
-
L. Liu, E. S. K. Yu, and J. Mylopoulos, Security and privacy requirements analysis within a social setting, in Proc. RE'03, IEEE Press, 2003, pp. 151-161.
-
(2003)
Proc. RE'03
, pp. 151-161
-
-
Liu, L.1
Yu, E.S.K.2
Mylopoulos, J.3
-
22
-
-
36049032185
-
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
-
F. Massacci, J. Mylopoulos, and N. Zannone, Hierarchical hippocratic databases with minimal disclosure for virtual organizations, The VLDB J., 2006.
-
(2006)
The VLDB J
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
23
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
-
F. Massacci, M. Prest, and N. Zannone, Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation, Comp. Standards & Interfaces 27(5) (2005) 445-455.
-
(2005)
Comp. Standards & Interfaces
, vol.27
, Issue.5
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
25
-
-
84874834655
-
Privacy promises, access control, and privacy management: Enforcing privacy throughout an enterprise by extending access control
-
IEEE Press
-
C. S. Powers P. Ashley, and M. Schunter, Privacy promises, access control, and privacy management: Enforcing privacy throughout an enterprise by extending access control, in Proc. ISEC'02, IEEE Press, 2002, pp. 13-21.
-
(2002)
Proc. ISEC'02
, pp. 13-21
-
-
Powers, C.S.1
Ashley, P.2
Schunter, M.3
-
26
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, IEEE Comp. 29(2) (1996) 38-47.
-
(1996)
IEEE Comp
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
27
-
-
17744386105
-
From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
-
A. van Lamsweerde, S. Brohez, R. De Landtsheer, and D. Janssens, From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering, in Proc. RHAS'03, 2003, pp. 49-56.
-
(2003)
Proc. RHAS'03
, pp. 49-56
-
-
van Lamsweerde, A.1
Brohez, S.2
De Landtsheer, R.3
Janssens, D.4
|