-
1
-
-
33750054462
-
Enterprise privacy promises and enforcement
-
Long Beach, California, pp, ACM Press, New York
-
Barth, A., Mitchell, J.C.: Enterprise privacy promises and enforcement. In: WITS 2005: Proceedings of the 2005 Workshop on Issues in the Theory of Security, Long Beach, California, pp. 58-66. ACM Press, New York (2005)
-
(2005)
WITS 2005: Proceedings of the 2005 Workshop on Issues in the Theory of Security
, pp. 58-66
-
-
Barth, A.1
Mitchell, J.C.2
-
2
-
-
38149024579
-
-
Bormans, J., Hill, K.: International standards organization. Information technology - multimedia framework (MPEG-21) - part 5: Rights expression language. ISO/IEC 21000-5:2004
-
Bormans, J., Hill, K.: International standards organization. Information technology - multimedia framework (MPEG-21) - part 5: Rights expression language. ISO/IEC 21000-5:2004
-
-
-
-
3
-
-
38149038390
-
IBM tivoli privacy manager solution design and best practices
-
Bucker, A., Haase, B., Moore, D., Keller, M., Koblinger, O., Wu, H.-F.: IBM tivoli privacy manager solution design and best practices. In: Redbooks (2002)
-
(2002)
Redbooks
-
-
Bucker, A.1
Haase, B.2
Moore, D.3
Keller, M.4
Koblinger, O.5
Wu, H.-F.6
-
4
-
-
33749616926
-
Open letter to P3P developers and replies
-
ACM Press, New York
-
Catlett, J.: Open letter to P3P developers and replies. In: ACM Conference on Computers, Freedom and Privacy, pp. 157-164. ACM Press, New York (2000)
-
(2000)
ACM Conference on Computers, Freedom and Privacy
, pp. 157-164
-
-
Catlett, J.1
-
5
-
-
38149081013
-
-
Coyle, K.: P3P: Pretty poor privacy? a social analysis of the platform for privacy preferences (P3P)
-
Coyle, K.: P3P: Pretty poor privacy? a social analysis of the platform for privacy preferences (P3P)
-
-
-
-
6
-
-
38149058673
-
-
Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M.: The platform for privacy preferences 1.0 (P3P 1.0) specification (2002)
-
Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M.: The platform for privacy preferences 1.0 (P3P 1.0) specification (2002)
-
-
-
-
7
-
-
0037703521
-
-
Cranor, L.F., Arjula, M., Guduru, P.: Use of a P3P user agent by early adopters. In: WPES, pp. 1-10 (2002)
-
Cranor, L.F., Arjula, M., Guduru, P.: Use of a P3P user agent by early adopters. In: WPES, pp. 1-10 (2002)
-
-
-
-
9
-
-
84893064260
-
Translating privacy practices into privacy promises: How to promise what you can keep
-
IEEE Computer Society, Washington, DC
-
Karjoth, G., Schunter, M., Herreweghen, E.V.: Translating privacy practices into privacy promises: How to promise what you can keep. In: POLICY 2003: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, p. 135. IEEE Computer Society, Washington, DC (2003)
-
(2003)
POLICY 2003: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 135
-
-
Karjoth, G.1
Schunter, M.2
Herreweghen, E.V.3
-
10
-
-
84948670934
-
-
Karjoth, G., Schunter, M., Waidner, M.: Privacy-enabled services for enterprises. In: Hameurlain, A., Cicchetti, R., Traunmüller, R. (eds.) DEXA 2002. LNCS, 2453, pp. 483-487. Springer, Heidelberg (2002)
-
Karjoth, G., Schunter, M., Waidner, M.: Privacy-enabled services for enterprises. In: Hameurlain, A., Cicchetti, R., Traunmüller, R. (eds.) DEXA 2002. LNCS, vol. 2453, pp. 483-487. Springer, Heidelberg (2002)
-
-
-
-
11
-
-
0036431099
-
Applying digital rights management systems to privacy rights management
-
Kenny, S., Korba, L.: Applying digital rights management systems to privacy rights management. Computers & Security 21(7), 648-664 (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.7
, pp. 648-664
-
-
Kenny, S.1
Korba, L.2
-
12
-
-
2942630821
-
-
3485: IBM Research. Enterprise Privacy Authorization Language EPAL
-
Research Report 3485: IBM Research. Enterprise Privacy Authorization Language (EPAL) (2003)
-
(2003)
Research Report
-
-
-
13
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
14
-
-
0035790675
-
The role-based access control system of a european bank: A case study and discussion
-
ACM Press, New York
-
Schaad, A., Moffett, J., Jacob, J.: The role-based access control system of a european bank: a case study and discussion. In: SACMAT 2001: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, pp. 3-9. ACM Press, New York (2001)
-
(2001)
SACMAT 2001: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 3-9
-
-
Schaad, A.1
Moffett, J.2
Jacob, J.3
-
16
-
-
20444494460
-
-
Stuffiebeam, W.H., Antón, A.I., He, Q., Jain, N.: Specifying privacy policies with P3P and EPAL: lessons learned. In: WPES, p. 35 (2004)
-
Stuffiebeam, W.H., Antón, A.I., He, Q., Jain, N.: Specifying privacy policies with P3P and EPAL: lessons learned. In: WPES, p. 35 (2004)
-
-
-
-
17
-
-
84954090557
-
-
Yu, T., Li, N., Anton, A.I.: A formal semantics for P3P. In: SWS '04: Proceedings of the 2004 Workshop on Secure Web Service, pp. 1-8. ACM Press, New York (2004)
-
Yu, T., Li, N., Anton, A.I.: A formal semantics for P3P. In: SWS '04: Proceedings of the 2004 Workshop on Secure Web Service, pp. 1-8. ACM Press, New York (2004)
-
-
-
|