-
1
-
-
37249047727
-
Service-oriented Assurance - Comprehensive Security by Explicit Assurances
-
Karjoth, G., Pfitzmann, B., Schunter, M., Waidner, M.: Service-oriented Assurance - Comprehensive Security by Explicit Assurances. In: Proc. of QoP'05 (2005)
-
(2005)
Proc. of QoP'05
-
-
Karjoth, G.1
Pfitzmann, B.2
Schunter, M.3
Waidner, M.4
-
2
-
-
37249018298
-
Security and Trust in IT Business Outsourcing: A Manifesto
-
Karabulut, Y., Kerschbaum, F., Massacci, F., Robinson, P., Yautsiukhin, A.: Security and Trust in IT Business Outsourcing: a Manifesto. In: Proc. STM. ENTCS (2006)
-
(2006)
Proc. STM. ENTCS
-
-
Karabulut, Y.1
Kerschbaum, F.2
Massacci, F.3
Robinson, P.4
Yautsiukhin, A.5
-
3
-
-
34250779459
-
The ins and outs of it outsourcing
-
Goth, G.: The ins and outs of it outsourcing. IT Professional 1, 11-14 (1999)
-
(1999)
IT Professional
, vol.1
, pp. 11-14
-
-
Goth, G.1
-
4
-
-
38049005427
-
Delegation of Obligations
-
Schaad, A., Moffett, J.: Delegation of Obligations. In: Proc. POLICY, pp. 25-35 (2002)
-
(2002)
Proc. POLICY
, pp. 25-35
-
-
Schaad, A.1
Moffett, J.2
-
5
-
-
0345829056
-
Provisions and obligations in policy rule management
-
Bettini, C., Jajodia, S., Wang, X.S., Wijesekera, D.: Provisions and obligations in policy rule management. J. Network and System Mgmt. 11(3), 351-372 (2003)
-
(2003)
J. Network and System Mgmt
, vol.11
, Issue.3
, pp. 351-372
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
7
-
-
33748543201
-
Distributed Usage Control
-
Pretschner, A., Hilty, M., Basin, D.: Distributed Usage Control. CACM 49(9), 39-44 (2006)
-
(2006)
CACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
8
-
-
36649028392
-
A System Model and a Policy Language for Distributed Usage Control
-
Technical Report I-ST-20, DoCoMo
-
Hilty, M., Pretschner, A., Schaefer, C., Walter, T.: A System Model and a Policy Language for Distributed Usage Control. Technical Report I-ST-20, DoCoMo (2006)
-
(2006)
-
-
Hilty, M.1
Pretschner, A.2
Schaefer, C.3
Walter, T.4
-
9
-
-
0242674432
-
Hippocratic DBs
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic DBs. In: VLDB, pp. 143-154 (2002)
-
(2002)
VLDB
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
10
-
-
2342618084
-
Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data
-
Karjoth, G., Schunter, M., Waidner, M.: Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data. In: Proc. PET, pp. 69-84 (2002)
-
(2002)
Proc. PET
, pp. 69-84
-
-
Karjoth, G.1
Schunter, M.2
Waidner, M.3
-
11
-
-
37249069731
-
-
W3C: The Platform for Privacy Preferences 1.1 (P3P1.1) Spec, Working Draft (2005)
-
W3C: The Platform for Privacy Preferences 1.1 (P3P1.1) Spec, Working Draft (2005)
-
-
-
-
12
-
-
0141929307
-
XrML-eXtensible rights Markup Language
-
Wang, X., Lao, G., DeMartini, T., Reddy, H., Nguyen, M., Valenzuela, E.: XrML-eXtensible rights Markup Language. In: Proc. XMLSEC, pp. 71-79 (2002)
-
(2002)
Proc. XMLSEC
, pp. 71-79
-
-
Wang, X.1
Lao, G.2
DeMartini, T.3
Reddy, H.4
Nguyen, M.5
Valenzuela, E.6
-
13
-
-
37249057581
-
-
Iannella, R, Open Digital Rights Language, Version 1.1 2002
-
Iannella, R.: Open Digital Rights Language - Version 1.1 (2002), odrl.net/1.1/ODRL-11.pdf
-
-
-
-
14
-
-
13444275220
-
Edit Automata: Enforcement Mechanisms for Run-time Security Policies
-
Ligatti, J., Bauer, L., Walker, D.: Edit Automata: Enforcement Mechanisms for Run-time Security Policies. International Journal of Information Security 4(1-2), 2-16 (2005)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
15
-
-
37249019315
-
Enforcement for Usage Control-An Overview of Control Mechanisms
-
Technical Report I-ST-18, DoCoMo EuroLabs
-
Hilty, M., Pretschner, A., Schaefer, C., Walter, T.: Enforcement for Usage Control-An Overview of Control Mechanisms. Technical Report I-ST-18, DoCoMo EuroLabs (2006)
-
(2006)
-
-
Hilty, M.1
Pretschner, A.2
Schaefer, C.3
Walter, T.4
-
16
-
-
3242890796
-
-
Filman, R., Elrad, T., Clarke, S., Aksit, M.: Aspect-Oriented SW Development (2004)
-
(2004)
Aspect-Oriented SW Development
-
-
Filman, R.1
Elrad, T.2
Clarke, S.3
Aksit, M.4
-
18
-
-
31844457357
-
Composing Security Policies with Polymer
-
ACM Press, New York
-
Bauer, L., Ligatti, J., Walker, D.: Composing Security Policies with Polymer. In: Proc. ACM SIGPLAN Conf. on Programming Language Design and Implementation, pp. 305-314. ACM Press, New York (2005)
-
(2005)
Proc. ACM SIGPLAN Conf. on Programming Language Design and Implementation
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
19
-
-
30144435965
-
Enhancing Data Authentity and Integrity in P2P Systems
-
Zhang, X., Chen, S., Sandhu, R.: Enhancing Data Authentity and Integrity in P2P Systems. IEEE Internet Computing 9(6), 18-25 (2005)
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.6
, pp. 18-25
-
-
Zhang, X.1
Chen, S.2
Sandhu, R.3
-
20
-
-
30144435491
-
-
Sandhu, R., Zhang, X.: Peer-to-peer access control architecture using trusted computing technology. In: SACMAT, pp. 147-158 (2005)
-
Sandhu, R., Zhang, X.: Peer-to-peer access control architecture using trusted computing technology. In: SACMAT, pp. 147-158 (2005)
-
-
-
-
21
-
-
21144442036
-
Revisiting software protection
-
van Oorschot, P.: Revisiting software protection. In: Proc. IST, pp. 1-13 (2003)
-
(2003)
Proc. IST
, pp. 1-13
-
-
van Oorschot, P.1
-
23
-
-
37249073151
-
-
W3C: A P3P Preference Exchange Language 1.0 (APPEL1.0) (2002)
-
W3C: A P3P Preference Exchange Language 1.0 (APPEL1.0) (2002)
-
-
-
-
24
-
-
0142157015
-
A toolkit for managing enterprise privacy policies
-
Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
-
Backes, M., Pfitzmann, B., Schunter, M.: A toolkit for managing enterprise privacy policies. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 162-180. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2808
, pp. 162-180
-
-
Backes, M.1
Pfitzmann, B.2
Schunter, M.3
-
25
-
-
0033489645
-
Optimistic security: A new access control paradigm
-
Povey, D.: Optimistic security: a new access control paradigm. In: Proc. workshop on new security paradigms, pp. 40-45 (1999)
-
(1999)
Proc. workshop on new security paradigms
, pp. 40-45
-
-
Povey, D.1
-
26
-
-
33646071594
-
On obligations
-
Hilty, M., Basin, D., Pretschner, A.: On obligations. In: Proc. ESORICS, pp. 98-117 (2005)
-
(2005)
Proc. ESORICS
, pp. 98-117
-
-
Hilty, M.1
Basin, D.2
Pretschner, A.3
|