메뉴 건너뛰기




Volumn 149, Issue , 2006, Pages 8-19

An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench

Author keywords

Design; Policy; Privacy; Security; Social and legal issues; Usability

Indexed keywords

NATURAL LANGUAGE; PRIVACY POLICIES; SPARCLE POLICY; WORKBENCH;

EID: 34250717425     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1143120.1143123     Document Type: Conference Paper
Times cited : (70)

References (24)
  • 2
    • 0029697680 scopus 로고    scopus 로고
    • Anderson R. J. A (1996). Security Policy Model for Clinical Information Systems. In the Proceedings of the 1996 IEEE Symposium on Security and Privacy, 30-43.
    • Anderson R. J. A (1996). Security Policy Model for Clinical Information Systems. In the Proceedings of the 1996 IEEE Symposium on Security and Privacy, 30-43.
  • 10
    • 34250768651 scopus 로고    scopus 로고
    • Privacy policies and privacy preferences
    • L. Cranor & S. Garfinkel Eds, Sebastopol, CA: O'Reilly
    • Cranor, L. (2005). Privacy policies and privacy preferences. In L. Cranor & S. Garfinkel (Eds.) Security and Usability: Designing Secure Systems That People Can Use, Sebastopol, CA: O'Reilly, 447-472.
    • (2005) Security and Usability: Designing Secure Systems That People Can Use , pp. 447-472
    • Cranor, L.1
  • 11
    • 34250779279 scopus 로고    scopus 로고
    • IBM Research UIMA
    • IBM Research UIMA(2005) http://www.research.ibm.com/UIMA/
    • (2005)
  • 12
    • 34250694036 scopus 로고    scopus 로고
    • IBM Tivoli Privacy Manager for eBusiness
    • IBM Tivoli Privacy Manager for eBusiness (2004). http://www-306.ibm. com/software/tivoli/products/privacy-mgr-e-bus/.
    • (2004)
  • 14
    • 19944382845 scopus 로고    scopus 로고
    • Privacy in information technology: Designing to enable privacy policy management in organizations
    • Karat, J., Karat, C., Brodie, C., and Feng, J. (2005). Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human Computer Studies, 63, 1-2, 153-174.
    • (2005) International Journal of Human Computer Studies , vol.63
    • Karat, J.1    Karat, C.2    Brodie, C.3    Feng, J.4
  • 17
    • 34250765527 scopus 로고    scopus 로고
    • Microsoft Internet Explorer
    • Microsoft Internet Explorer (2004). Help Safeguard your privacy on the web. http://www.microsoft.com/windows/ie/using/howto/privacy/config.mspx
    • (2004) Help Safeguard your privacy on the web
  • 18
    • 34250741829 scopus 로고    scopus 로고
    • Neff, M., Byrd, R., and Boguraev, B. (2003) The Talent system: TEX-TRACT architecture and data model. In Proceedings of HLT-NAACL Workshop on Software Engineering and Architectures of Language Technology Systems, Edmonton, Alberta, Canada.
    • Neff, M., Byrd, R., and Boguraev, B. (2003) The Talent system: TEX-TRACT architecture and data model. In Proceedings of HLT-NAACL Workshop on Software Engineering and Architectures of Language Technology Systems, Edmonton, Alberta, Canada.
  • 19
    • 34250747307 scopus 로고    scopus 로고
    • OASIS 2005, extensible Access Control Markup Language Version 2.0
    • OASIS (2005). extensible Access Control Markup Language Version 2.0. http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os. pdf.
  • 20
    • 34250708874 scopus 로고    scopus 로고
    • OASIS (2005). Privacy Policy Profile of XACML v2.0. http://docs.oasis- open.orig/xacml/2.0/PRIVACYPROFILE/access_control-xacml-2.0-privacy_profile- specos.pdf.
    • OASIS (2005). Privacy Policy Profile of XACML v2.0. http://docs.oasis- open.orig/xacml/2.0/PRIVACYPROFILE/access_control-xacml-2.0-privacy_profile- specos.pdf.
  • 22
    • 0027805822 scopus 로고
    • Privacy policies and practices: Inside the organizational maze
    • Smith, J. (1993). Privacy policies and practices: Inside the organizational maze. Communications of the ACM, 36, 12, 105-122.
    • (1993) Communications of the ACM , vol.36 , Issue.12 , pp. 105-122
    • Smith, J.1
  • 23
    • 85084161247 scopus 로고    scopus 로고
    • Whitten, A. and Tygar J. D. (1999) Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 9th USENIX Security Symposium, August, 1999.
    • Whitten, A. and Tygar J. D. (1999) Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 9th USENIX Security Symposium, August, 1999.
  • 24
    • 34250712744 scopus 로고    scopus 로고
    • W3C (2002) A P3P Preference Exchange Language 1.0 (APPEL 1.0). http://www.w3.org/TR/P3P-preferences/
    • W3C (2002) A P3P Preference Exchange Language 1.0 (APPEL 1.0). http://www.w3.org/TR/P3P-preferences/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.