-
1
-
-
27644576852
-
Policy ratification
-
Stockholm Sweden, pp, IEEE Computer Society, Los Alamitos
-
Agrawal, D., Giles, J., Lee, K.-W., Lobo, J.: Policy ratification. In: POLICY'05. Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, Stockholm Sweden, pp. 223-232. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
POLICY'05. Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 223-232
-
-
Agrawal, D.1
Giles, J.2
Lee, K.-W.3
Lobo, J.4
-
2
-
-
38049042875
-
-
available at
-
Amazon.com: Amazon privacy notice, available at http://www.amazon.com/ exec/obidos/tg/browse/-/468496/102-8997954-0573735
-
Amazon.com: Amazon privacy notice
-
-
-
4
-
-
38049050280
-
-
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (epal 1.2). W3C Member Submission 10 (November 2003), available at http://www.w3.org/Submission/EPAL/
-
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (epal 1.2). W3C Member Submission 10 (November 2003), available at http://www.w3.org/Submission/EPAL/
-
-
-
-
5
-
-
20444460387
-
Conflict and combination in privacy policy languages
-
ACM Press, New York
-
Barth, A., Mitchell, J.C., Rosenstein, J.: Conflict and combination in privacy policy languages. In: WPES '04: Proceedings of the 2004 ACM workshop on Privacy in the electronic society, pp. 45-46. ACM Press, New York (2004)
-
(2004)
WPES '04: Proceedings of the 2004 ACM workshop on Privacy in the electronic society
, pp. 45-46
-
-
Barth, A.1
Mitchell, J.C.2
Rosenstein, J.3
-
6
-
-
84893077785
-
Obligation monitoring in policy management
-
Washington, DC, USA, p, IEEE Computer Society, Los Alamitos
-
Bettini, C., Jajodia, S., Wang, X., Wijesekera, D.: Obligation monitoring in policy management. In: POLICY'02. Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks, Washington, DC, USA, p. 2. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
POLICY'02. Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks
, pp. 2
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.3
Wijesekera, D.4
-
7
-
-
84992227458
-
Proposed nist standard for role-based access control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224-274 (2001)
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
9
-
-
85088054290
-
-
Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: Inverardi, P., Jazayeri, M. (eds.) ICSE 2005. LNCS, 4309, pp. 196-205. Springer, Heidelberg (2006)
-
Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: Inverardi, P., Jazayeri, M. (eds.) ICSE 2005. LNCS, vol. 4309, pp. 196-205. Springer, Heidelberg (2006)
-
-
-
-
11
-
-
34547346853
-
On the modeling and analysis of obligations
-
ACM Press, New York
-
Irwin, K., Yu, T., Winsborough, W.H.: On the modeling and analysis of obligations. In: CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pp. 134-143. ACM Press, New York (2006)
-
(2006)
CCS '06: Proceedings of the 13th ACM conference on Computer and communications security
, pp. 134-143
-
-
Irwin, K.1
Yu, T.2
Winsborough, W.H.3
-
12
-
-
0025406189
-
Constraint query languages (preliminary report)
-
ACM Press, New York
-
Kanellakis, P.C., Kuper, G.M., Revesz, P.Z.: Constraint query languages (preliminary report). In: PODS '90: Proceedings of the ninth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, pp. 299-313. ACM Press, New York (1990)
-
(1990)
PODS '90: Proceedings of the ninth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
, pp. 299-313
-
-
Kanellakis, P.C.1
Kuper, G.M.2
Revesz, P.Z.3
-
13
-
-
84957805078
-
-
Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: Privacy-enabled management of customer data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 69-84. Springer, Heidelberg (2003)
-
Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: Privacy-enabled management of customer data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 69-84. Springer, Heidelberg (2003)
-
-
-
-
15
-
-
35248834606
-
-
Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management languages. In: Dahl, V., Wadler, P. (eds.) PADL 2003. LNCS, 2562, pp. 58-73. Springer, Heidelberg (2002)
-
Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management languages. In: Dahl, V., Wadler, P. (eds.) PADL 2003. LNCS, vol. 2562, pp. 58-73. Springer, Heidelberg (2002)
-
-
-
-
16
-
-
38049026822
-
On parametric obligation policies: Enabling privacyaware information lifecycle management in enterprises
-
Tech. Report HPL-2007-7, Trusted Systems Laboratory, HP Laboratories Bristol, available at
-
Mont, M.C., Beato, F.: On parametric obligation policies: Enabling privacyaware information lifecycle management in enterprises. Tech. Report HPL-2007-7, Trusted Systems Laboratory, HP Laboratories Bristol, available at http://www.hpl.hp.com/techreports/2007/HPL-2007-7.pdf
-
-
-
Mont, M.C.1
Beato, F.2
-
17
-
-
34548016110
-
Privacy aware role based access control
-
ACM Press, Sophia Antipolis, France
-
Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privacy aware role based access control. In: SACMAT '07. Proceedings of the 12th ACM symposium on Access control models and technologies. ACM Press, Sophia Antipolis, France (2007)
-
(2007)
SACMAT '07. Proceedings of the 12th ACM symposium on Access control models and technologies
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
18
-
-
38049021578
-
-
OASIS: extensible access control markup language (xacml) 2.0, available at http://www.oasis-open.org/
-
OASIS: extensible access control markup language (xacml) 2.0, available at http://www.oasis-open.org/
-
-
-
-
19
-
-
38049059317
-
-
Organisation for Economic Co-operation and Development: Oecd guidelines on the protection of privacy and transborder flows of personal data of 1980, available at http ://www.oecd.org/
-
Organisation for Economic Co-operation and Development: Oecd guidelines on the protection of privacy and transborder flows of personal data of 1980, available at http ://www.oecd.org/
-
-
-
-
20
-
-
84874834655
-
Privacy promises, access control, and privacy management
-
Washington, DC, USA, p, IEEE Computer Society, Los Alamitos
-
Powers, CS.: Privacy promises, access control, and privacy management. In: ISEC '02: Proceedings of the Third International Symposium on Electronic Commerce, Washington, DC, USA, p. 13. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
ISEC '02: Proceedings of the Third International Symposium on Electronic Commerce
, pp. 13
-
-
Powers, C.S.1
-
21
-
-
0001821002
-
Constraint databases: A survey
-
Thalheim, B, ed, Semantics in Databases, Springer, Heidelberg
-
Revesz, P.Z.: Constraint databases: A survey. In: Thalheim, B. (ed.) Semantics in Databases. LNCS, vol. 1358, pp. 209-246. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1358
, pp. 209-246
-
-
Revesz, P.Z.1
-
22
-
-
84957369394
-
-
Revesz, P.Z.: Safe datalog queries with linear constraints, In: Maher, M.J., Puget, J.-F. (eds.) CP 1998. LNCS, 1520, pp. 355-369. Springer, Heidelberg (1998)
-
Revesz, P.Z.: Safe datalog queries with linear constraints, In: Maher, M.J., Puget, J.-F. (eds.) CP 1998. LNCS, vol. 1520, pp. 355-369. Springer, Heidelberg (1998)
-
-
-
-
23
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
24
-
-
2342563770
-
Grand challenges in information security: Process and output
-
January
-
Smith, S.W., Spafford, E.H.: Grand challenges in information security: Process and output. IEEE Security and Privacy, 69-71 (January 2004)
-
(2004)
IEEE Security and Privacy
, vol.69-71
-
-
Smith, S.W.1
Spafford, E.H.2
-
25
-
-
38049025809
-
-
TRUSTe.org: An independent, nonprofit enabling trust based on privacy for personal information on the internet, available at http://www.truste.org/
-
TRUSTe.org: An independent, nonprofit enabling trust based on privacy for personal information on the internet, available at http://www.truste.org/
-
-
-
-
26
-
-
38049094562
-
Towards reasonability properties for accesscontrol policy languages with extended xacml analysis
-
Tech. Report CS-06-04, CS, Brown University, available at
-
Tschantz, M.C., Krishnamurthi, S.: Towards reasonability properties for accesscontrol policy languages with extended xacml analysis. Tech. Report CS-06-04, CS, Brown University, available at http://www.cs.brown.edu/ publications/techreports/reports/CS-06-04.html
-
-
-
Tschantz, M.C.1
Krishnamurthi, S.2
-
27
-
-
38049030205
-
-
United State Department of Health: Health insurance portability and accountability act of 1996, available at http://www.hhs.gov/ocr/hipaa/
-
United State Department of Health: Health insurance portability and accountability act of 1996, available at http://www.hhs.gov/ocr/hipaa/
-
-
-
-
28
-
-
34548013268
-
-
U.S. Senate Committee on Banking, Information regarding the gramm-leach-bliley act of, available at
-
U.S. Senate Committee on Banking, Housing, and Urban Affairs: Information regarding the gramm-leach-bliley act of 1999, available at http://banking. senate.gov/conf/
-
(1999)
Housing, and Urban Affairs
-
-
|