메뉴 건너뛰기




Volumn 4657 LNCS, Issue , 2007, Pages 83-93

Usage control in service-oriented architectures

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION RETRIEVAL SYSTEMS; MATHEMATICAL MODELS; REQUIREMENTS ENGINEERING; SECURITY OF DATA;

EID: 37249079159     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74409-2_11     Document Type: Conference Paper
Times cited : (14)

References (26)
  • 1
    • 37249047727 scopus 로고    scopus 로고
    • Service-oriented Assurance - Comprehensive Security by Explicit Assurances
    • Karjoth, G., Pfitzmann, B., Schunter, M., Waidner, M.: Service-oriented Assurance - Comprehensive Security by Explicit Assurances. In: Proc. of QoP'05 (2005)
    • (2005) Proc. of QoP'05
    • Karjoth, G.1    Pfitzmann, B.2    Schunter, M.3    Waidner, M.4
  • 3
    • 34250779459 scopus 로고    scopus 로고
    • The ins and outs of it outsourcing
    • Goth, G.: The ins and outs of it outsourcing. IT Professional 1, 11-14 (1999)
    • (1999) IT Professional , vol.1 , pp. 11-14
    • Goth, G.1
  • 4
    • 38049005427 scopus 로고    scopus 로고
    • Delegation of Obligations
    • Schaad, A., Moffett, J.: Delegation of Obligations. In: Proc. POLICY, pp. 25-35 (2002)
    • (2002) Proc. POLICY , pp. 25-35
    • Schaad, A.1    Moffett, J.2
  • 7
    • 33748543201 scopus 로고    scopus 로고
    • Distributed Usage Control
    • Pretschner, A., Hilty, M., Basin, D.: Distributed Usage Control. CACM 49(9), 39-44 (2006)
    • (2006) CACM , vol.49 , Issue.9 , pp. 39-44
    • Pretschner, A.1    Hilty, M.2    Basin, D.3
  • 8
    • 36649028392 scopus 로고    scopus 로고
    • A System Model and a Policy Language for Distributed Usage Control
    • Technical Report I-ST-20, DoCoMo
    • Hilty, M., Pretschner, A., Schaefer, C., Walter, T.: A System Model and a Policy Language for Distributed Usage Control. Technical Report I-ST-20, DoCoMo (2006)
    • (2006)
    • Hilty, M.1    Pretschner, A.2    Schaefer, C.3    Walter, T.4
  • 10
    • 2342618084 scopus 로고    scopus 로고
    • Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data
    • Karjoth, G., Schunter, M., Waidner, M.: Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data. In: Proc. PET, pp. 69-84 (2002)
    • (2002) Proc. PET , pp. 69-84
    • Karjoth, G.1    Schunter, M.2    Waidner, M.3
  • 11
    • 37249069731 scopus 로고    scopus 로고
    • W3C: The Platform for Privacy Preferences 1.1 (P3P1.1) Spec, Working Draft (2005)
    • W3C: The Platform for Privacy Preferences 1.1 (P3P1.1) Spec, Working Draft (2005)
  • 13
    • 37249057581 scopus 로고    scopus 로고
    • Iannella, R, Open Digital Rights Language, Version 1.1 2002
    • Iannella, R.: Open Digital Rights Language - Version 1.1 (2002), odrl.net/1.1/ODRL-11.pdf
  • 15
    • 37249019315 scopus 로고    scopus 로고
    • Enforcement for Usage Control-An Overview of Control Mechanisms
    • Technical Report I-ST-18, DoCoMo EuroLabs
    • Hilty, M., Pretschner, A., Schaefer, C., Walter, T.: Enforcement for Usage Control-An Overview of Control Mechanisms. Technical Report I-ST-18, DoCoMo EuroLabs (2006)
    • (2006)
    • Hilty, M.1    Pretschner, A.2    Schaefer, C.3    Walter, T.4
  • 19
    • 30144435965 scopus 로고    scopus 로고
    • Enhancing Data Authentity and Integrity in P2P Systems
    • Zhang, X., Chen, S., Sandhu, R.: Enhancing Data Authentity and Integrity in P2P Systems. IEEE Internet Computing 9(6), 18-25 (2005)
    • (2005) IEEE Internet Computing , vol.9 , Issue.6 , pp. 18-25
    • Zhang, X.1    Chen, S.2    Sandhu, R.3
  • 20
    • 30144435491 scopus 로고    scopus 로고
    • Sandhu, R., Zhang, X.: Peer-to-peer access control architecture using trusted computing technology. In: SACMAT, pp. 147-158 (2005)
    • Sandhu, R., Zhang, X.: Peer-to-peer access control architecture using trusted computing technology. In: SACMAT, pp. 147-158 (2005)
  • 21
    • 21144442036 scopus 로고    scopus 로고
    • Revisiting software protection
    • van Oorschot, P.: Revisiting software protection. In: Proc. IST, pp. 1-13 (2003)
    • (2003) Proc. IST , pp. 1-13
    • van Oorschot, P.1
  • 23
    • 37249073151 scopus 로고    scopus 로고
    • W3C: A P3P Preference Exchange Language 1.0 (APPEL1.0) (2002)
    • W3C: A P3P Preference Exchange Language 1.0 (APPEL1.0) (2002)
  • 24
    • 0142157015 scopus 로고    scopus 로고
    • A toolkit for managing enterprise privacy policies
    • Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
    • Backes, M., Pfitzmann, B., Schunter, M.: A toolkit for managing enterprise privacy policies. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 162-180. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2808 , pp. 162-180
    • Backes, M.1    Pfitzmann, B.2    Schunter, M.3
  • 25
    • 0033489645 scopus 로고    scopus 로고
    • Optimistic security: A new access control paradigm
    • Povey, D.: Optimistic security: a new access control paradigm. In: Proc. workshop on new security paradigms, pp. 40-45 (1999)
    • (1999) Proc. workshop on new security paradigms , pp. 40-45
    • Povey, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.