-
2
-
-
38049042875
-
-
Available at
-
Amazon.com. Amazon privacy notice. Available at http://www.amazon.com/ exec/obidos/tg/browse/-/468496/102-8997954-0573735.
-
Amazon.com. Amazon privacy notice
-
-
-
3
-
-
77954321643
-
A comparison of two privacy policy languages: Epal and xacml
-
New York, NY, USA, ACM Press
-
A. H. Anderson. A comparison of two privacy policy languages: Epal and xacml. In SWS '06: Proceedings of the 3rd ACM workshop on Secure web services, pages 53-60, New York, NY, USA, 2006. ACM Press.
-
(2006)
SWS '06: Proceedings of the 3rd ACM workshop on Secure web services
, pp. 53-60
-
-
Anderson, A.H.1
-
4
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
Washington, DC, USA, IEEE Computer Society
-
A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum. Privacy and contextual integrity: Framework and applications. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pages 184-198, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06)
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
5
-
-
20444460387
-
Conflict and combination in privacy policy languages
-
New York, NY, USA, ACM Press
-
A. Barth, J. C. Mitchell, and J. Rosenstein. Conflict and combination in privacy policy languages. In WPES '04: Proceedings of the 2004 ACM workshop on Privacy in the electronic society, pages 45-46, New York, NY, USA, 2004. ACM Press.
-
(2004)
WPES '04: Proceedings of the 2004 ACM workshop on Privacy in the electronic society
, pp. 45-46
-
-
Barth, A.1
Mitchell, J.C.2
Rosenstein, J.3
-
6
-
-
34548051953
-
-
online privacy policy. Available at
-
Blizzard.com. Blizzard entertainment online privacy policy. Available at http://www.blizzard.com/privacy.shtml.
-
Blizzard.com. Blizzard entertainment
-
-
-
8
-
-
84949201378
-
A framework for multiple authorization types in a healthcare application system
-
Washington, DC, USA, IEEE Computer Society
-
R. Chandramouli. A framework for multiple authorization types in a healthcare application system. In ACSAC '01: Proceedings of the 17th Annual Computer Security Applications Conference, page 137, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
ACSAC '01: Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 137
-
-
Chandramouli, R.1
-
9
-
-
34548040880
-
-
eBay.com. ebay privacy policy. Available at http://pages.ebay.com/help/ policies/privacy-policy.html.
-
eBay.com. ebay privacy policy. Available at http://pages.ebay.com/help/ policies/privacy-policy.html.
-
-
-
-
10
-
-
57349087822
-
-
Federal Trade Commision, online privacy protection act of 1998. Available at
-
Federal Trade Commision. Children's online privacy protection act of 1998. Available at http://www.cdt.org/legislation/105th/privacy/coppa.html.
-
Children's
-
-
-
11
-
-
84992227458
-
Proposed nist standard for role-based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur., 4(3):224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
12
-
-
0013176783
-
-
Springer-Verlag New York, Inc, New York, NY, USA
-
S. Fischer-Hubner. IT-security and privacy: design and use of privacy-enhancing security mechanisms. Springer-Verlag New York, Inc., New York, NY, USA, 2001.
-
(2001)
IT-security and privacy: Design and use of privacy-enhancing security mechanisms
-
-
Fischer-Hubner, S.1
-
13
-
-
30144433198
-
Privacy enforcement with an extended role-based access control model
-
TR-2003-09, February 28, 2003
-
Q. He. Privacy enforcement with an extended role-based access control model. NCSU Computer Science Technical Report TR-2003-09, February 28, 2003.
-
NCSU Computer Science Technical Report
-
-
He, Q.1
-
14
-
-
84948735377
-
A privacy policy model for enterprises
-
G. Karjoth and M. Schunter. A privacy policy model for enterprises. In CSFW, pages 271-281, 2002.
-
(2002)
CSFW
, pp. 271-281
-
-
Karjoth, G.1
Schunter, M.2
-
15
-
-
34548013269
-
-
OASIS. Core and hierarchical role based access control (rbac) profile of xacml v2.0. Available at http://www.oasis-open.org/.
-
OASIS. Core and hierarchical role based access control (rbac) profile of xacml v2.0. Available at http://www.oasis-open.org/.
-
-
-
-
16
-
-
34548024333
-
-
OASIS, extensible access control markup language (xacml) 2.0. Available at http://www.oasis-open.org/.
-
OASIS, extensible access control markup language (xacml) 2.0. Available at http://www.oasis-open.org/.
-
-
-
-
17
-
-
34548013915
-
-
OASIS. Hierarchical resource profile of xacml v2.0. Available at http://www.oasis-open.org/.
-
OASIS. Hierarchical resource profile of xacml v2.0. Available at http://www.oasis-open.org/.
-
-
-
-
18
-
-
34548043671
-
-
OASIS. Privacy policy profile of xacml v2.0. Available at http://www.oasis-open.org/.
-
OASIS. Privacy policy profile of xacml v2.0. Available at http://www.oasis-open.org/.
-
-
-
-
19
-
-
34548022286
-
-
Organisation for Economic Co-operation and Development. Oecd guidelines on the protection of privacy and transborder flows of personal data of 1980. Available at http://www.oecd.org/.
-
Organisation for Economic Co-operation and Development. Oecd guidelines on the protection of privacy and transborder flows of personal data of 1980. Available at http://www.oecd.org/.
-
-
-
-
20
-
-
84874834655
-
Privacy promises, access control, and privacy management
-
Washington, DC, USA, IEEE Computer Society
-
C. S. Powers. Privacy promises, access control, and privacy management. In ISEC '02: Proceedings of the Third International Symposium on Electronic Commerce, page 13, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
ISEC '02: Proceedings of the Third International Symposium on Electronic Commerce
, pp. 13
-
-
Powers, C.S.1
-
21
-
-
34548033420
-
-
E. B. J. L. Qun Ni, Alberto Trombetta. Privacy aware role-based access control. CERIAS Technical Report
-
E. B. J. L. Qun Ni, Alberto Trombetta. Privacy aware role-based access control. CERIAS Technical Report.
-
-
-
-
22
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
23
-
-
33845246527
-
A policy-based management framework for pervasive systems using axiomatized rule-actions
-
Washington, DC, USA, IEEE Computer Society
-
C. Shankar and R. Campbell. A policy-based management framework for pervasive systems using axiomatized rule-actions. In NCA '05: Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications, pages 255-258, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
NCA '05: Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications
, pp. 255-258
-
-
Shankar, C.1
Campbell, R.2
-
24
-
-
34548033889
-
-
TRUSTe.org. An independent, nonprofit enabling trust based on privacy for personal information on the internet. Available at http://www.truste.org/.
-
TRUSTe.org. An independent, nonprofit enabling trust based on privacy for personal information on the internet. Available at http://www.truste.org/.
-
-
-
-
25
-
-
34548044646
-
-
United State Department of Health. Health insurance portability and accountability act of 1996. Available at http://www.hhs.gov/ocr/hipaa/.
-
United State Department of Health. Health insurance portability and accountability act of 1996. Available at http://www.hhs.gov/ocr/hipaa/.
-
-
-
-
26
-
-
34548013268
-
-
U.S. Senate Committee on Banking, Information regarding the gramm-leach-bliley act of, Available at
-
U.S. Senate Committee on Banking, Housing, and Urban Affairs. Information regarding the gramm-leach-bliley act of 1999. Available at http://banking. senate.gov/conf/.
-
(1999)
Housing, and Urban Affairs
-
-
|