-
1
-
-
38049023063
-
-
Moses, T, extensible Access Control Markup Language (XACML) version 1.0. Technical report, OASIS February 2003
-
Moses, T.: extensible Access Control Markup Language (XACML) version 1.0. Technical report, OASIS (February 2003)
-
-
-
-
2
-
-
24944578141
-
-
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL 1.2), http://www.w3.org/Submission/EPAL/
-
Enterprise privacy authorization language (EPAL 1.2)
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
3
-
-
0003706051
-
-
Garner, B.A, ed, 8th edn. Thomson-West Publishers
-
Garner, B.A. (ed.): Black's Law Dictionary, 8th edn. Thomson-West Publishers (2004)
-
(2004)
Black's Law Dictionary
-
-
-
5
-
-
33749558954
-
Specifying and reasoning about dynamic access-control policies
-
August
-
Dougherty, D.J., Fisler, K., Krishnamurthi, S.: Specifying and reasoning about dynamic access-control policies. In: International Joint Conference on Automated Reasoning, pp. 632-646 (August 2006)
-
(2006)
International Joint Conference on Automated Reasoning
, pp. 632-646
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
8
-
-
0042908709
-
Alternating-time temporal logic
-
Alur, R., Henzinger, T.A., Kupferman, O.: Alternating-time temporal logic. Journal of the ACM 49(5), 672-713 (2002)
-
(2002)
Journal of the ACM
, vol.49
, Issue.5
, pp. 672-713
-
-
Alur, R.1
Henzinger, T.A.2
Kupferman, O.3
-
10
-
-
3142757108
-
Specification and verification of data-driven web services
-
Deutsch, A., Sui, L., Vianu, V.: Specification and verification of data-driven web services. In: Principles of Database Systems, pp. 71-82 (2004)
-
(2004)
Principles of Database Systems
, pp. 71-82
-
-
Deutsch, A.1
Sui, L.2
Vianu, V.3
-
11
-
-
35248859723
-
Verifying temporal heap properties specified via evolution logic
-
Degano, P, ed, ESOP 2003 and ETAPS 2003, Springer, Heidelberg
-
Yahav, E., Reps, T., Sagiv, M., Wilhelm, R.: Verifying temporal heap properties specified via evolution logic. In: Degano, P. (ed.) ESOP 2003 and ETAPS 2003. LNCS, vol. 2618, pp. 204-222. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2618
, pp. 204-222
-
-
Yahav, E.1
Reps, T.2
Sagiv, M.3
Wilhelm, R.4
-
12
-
-
44949280298
-
Verification of concurrent programs: The automata-theoretic framework
-
Vardi, M. Y.: Verification of concurrent programs: The automata-theoretic framework. Annals of Pure and Applied Logic 51(1-2), 79-98 (1991)
-
(1991)
Annals of Pure and Applied Logic
, vol.51
, Issue.1-2
, pp. 79-98
-
-
Vardi, M.Y.1
-
13
-
-
0003962322
-
-
MIT Press, Cambridge
-
Clarke, E., Grumberg, O., Peled, D.: Model Checking. MIT Press, Cambridge (2000)
-
(2000)
Model Checking
-
-
Clarke, E.1
Grumberg, O.2
Peled, D.3
-
15
-
-
0039193007
-
Deontic logic
-
von Wright, G.H.: Deontic logic. Mind 60, 1-15 (1951)
-
(1951)
Mind
, vol.60
, pp. 1-15
-
-
von Wright, G.H.1
-
16
-
-
11144269059
-
Conditional obligation, deontic paradoxes, and the logic of agency
-
Bartha, P.: Conditional obligation, deontic paradoxes, and the logic of agency. Annals of Mathematics and Artificial Intelligence 9(1-2), 1-23 (1993)
-
(1993)
Annals of Mathematics and Artificial Intelligence
, vol.9
, Issue.1-2
, pp. 1-23
-
-
Bartha, P.1
-
17
-
-
9444299146
-
On obligations and abilities
-
Jamroga, W., van der Hoek, W., Wooldridge, M.: On obligations and abilities. In: Deontic Logic in Computer Science, pp. 165-181 (2004)
-
(2004)
Deontic Logic in Computer Science
, pp. 165-181
-
-
Jamroga, W.1
van der Hoek, W.2
Wooldridge, M.3
-
19
-
-
44149125457
-
A system to handle privacy obligations in enterprises
-
Technical Report HPL2005-180, HP Laboratories Bristol October
-
Mont, M.C.: A system to handle privacy obligations in enterprises. Technical Report HPL2005-180, HP Laboratories Bristol (October 2005)
-
(2005)
-
-
Mont, M.C.1
-
20
-
-
34547346853
-
On the modeling and analysis of obligations
-
Irwin, K., Yu, T., Winsborough, W.H.: On the modeling and analysis of obligations. In: Computer and Communications Security, pp. 134-143 (2006)
-
(2006)
Computer and Communications Security
, pp. 134-143
-
-
Irwin, K.1
Yu, T.2
Winsborough, W.H.3
-
22
-
-
84893077785
-
Obligation monitoring in policy management
-
Bettini, C., Jajodia, S., Wang, X., Wijesekera, D.: Obligation monitoring in policy management. In: Policies for Distributed Systems and Networks, pp. 2-12 (2002)
-
(2002)
Policies for Distributed Systems and Networks
, pp. 2-12
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.3
Wijesekera, D.4
-
24
-
-
0001809810
-
The Ponder specification language
-
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder specification language. In: Policies for Distributed Systems and Networks (2001)
-
(2001)
Policies for Distributed Systems and Networks
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
25
-
-
0034450091
-
XML document security based on provisional authorization
-
Kudo, M., Hada, S.: XML document security based on provisional authorization. In: Computer and Communications Security, pp. 87-96 (2000)
-
(2000)
Computer and Communications Security
, pp. 87-96
-
-
Kudo, M.1
Hada, S.2
-
26
-
-
0036986420
-
An asynchronous rule-based approach for business process automation using obligations
-
Abrahams, A., Eyers, D., Bacon, J.: An asynchronous rule-based approach for business process automation using obligations. In: Rule-Based Programming, pp. 93-104 (2002)
-
(2002)
Rule-Based Programming
, pp. 93-104
-
-
Abrahams, A.1
Eyers, D.2
Bacon, J.3
-
28
-
-
84894114949
-
An extended analysis of delegating obligations
-
Schaad, A.: An extended analysis of delegating obligations. In: Data and Applications Security, pp. 49-64 (2004)
-
(2004)
Data and Applications Security
, pp. 49-64
-
-
Schaad, A.1
-
29
-
-
26444620963
-
Revocation of obligation and authorisation policy objects
-
Schaad, A.: Revocation of obligation and authorisation policy objects. In: Data and Applications Security, pp. 28-39 (2005)
-
(2005)
Data and Applications Security
, pp. 28-39
-
-
Schaad, A.1
-
31
-
-
2442619852
-
A toolkit for managing enterprise privacy policies
-
Backes, M., Pfitzmann, B., Schunter, M.: A toolkit for managing enterprise privacy policies. In: European Symposium on Research in Computer Security, pp. 101-119 (2003)
-
(2003)
European Symposium on Research in Computer Security
, pp. 101-119
-
-
Backes, M.1
Pfitzmann, B.2
Schunter, M.3
-
32
-
-
33646071594
-
On obligations
-
Hilty, M., Basin, D.A., Pretschner, A.: On obligations. In: European Symposium on Research in Computer Security, pp. 98-117 (2005)
-
(2005)
European Symposium on Research in Computer Security
, pp. 98-117
-
-
Hilty, M.1
Basin, D.A.2
Pretschner, A.3
-
33
-
-
0034144974
-
Specifying communication in distributed information systems
-
Ehrich, H.D., Caleiro, C.: Specifying communication in distributed information systems. Acta Informatica 36(8), 591-616 (2000)
-
(2000)
Acta Informatica
, vol.36
, Issue.8
, pp. 591-616
-
-
Ehrich, H.D.1
Caleiro, C.2
-
34
-
-
33947620690
-
Privacy APIs: Access control techniques to analyze and verify legal privacy policies
-
Workshop
-
May, M.J., Gunter, CA., Lee, I.: Privacy APIs: Access control techniques to analyze and verify legal privacy policies. In: Computer Security Foundations Workshop (2006)
-
(2006)
Computer Security Foundations
-
-
May, M.J.1
Gunter, C.A.2
Lee, I.3
-
35
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and contextual integrity: Framework and applications. In: Symposium on Security and Privacy (2006)
-
(2006)
Symposium on Security and Privacy
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
|