-
1
-
-
84880467301
-
An xpath based preference language for P3P, in
-
Budapest, Hungary, May
-
R. Agrawal, J. Kiernan, R. Srikant and Y. Xu, An xpath based preference language for P3P, in: Proc. of the 12th International World Wide Web Conference, Budapest, Hungary, May 2003.
-
(2003)
Proc. of the 12th International World Wide Web Conference
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
34548037164
-
Managing privacy preferences in federated identity management
-
Fairfax, VA, USA, November
-
G.-J. Ahn and J. Lam, Managing privacy preferences in federated identity management, in: Proc. of the ACM Workshop on Digital Identity Management, Fairfax, VA, USA, November 2005.
-
(2005)
Proc. of the ACM Workshop on Digital Identity Management
-
-
Ahn, G.-J.1
Lam, J.2
-
3
-
-
34247380764
-
Supporting location-based conditions in access control policies
-
Taipei, Taiwan, March
-
C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati and P. Samarati, Supporting location-based conditions in access control policies, in: Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS'06), Taipei, Taiwan, March 2006.
-
(2006)
Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS'06)
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
De Capitani di Vimercati, S.4
Samarati, P.5
-
4
-
-
26444534381
-
Towards privacy-enhanced authorization policies and languages
-
Storrs, CA, USA, August
-
C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati and P. Samarati, Towards privacy-enhanced authorization policies and languages, in: Proc. of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CA, USA, August 2005.
-
(2005)
Proc. of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
-
-
Ardagna, C.A.1
Damiani, E.2
De Capitani di Vimercati, S.3
Samarati, P.4
-
5
-
-
33746682538
-
Enhancing user privacy through data handling policies
-
Sophia Antipolis, France, July/August
-
C.A. Ardagna, S. De Capitani di Vimercati and P. Samarati, Enhancing user privacy through data handling policies, in: Proc. of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July/August 2006.
-
(2006)
Proc. of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
-
-
Ardagna, C.A.1
De Capitani di Vimercati, S.2
Samarati, P.3
-
6
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
Hong Kong, China, August
-
C. Bettini, S. Jajodia, X. Sean Wang and D. Wijesekera, Provisions and obligations in policy management and security applications, in: Proc. of the 28th VLDB Conference, Hong Kong, China, August 2002.
-
(2002)
Proc. of the 28th VLDB Conference
-
-
Bettini, C.1
Jajodia, S.2
Sean Wang, X.3
Wijesekera, D.4
-
7
-
-
0024135278
-
The personal model of data: Towards a privacy oriented information system
-
J. Biskup and H.H. Brüggemann, The personal model of data: Towards a privacy oriented information system, Computers & Security 7 (1988), 575-597.
-
(1988)
Computers & Security
, vol.7
, pp. 575-597
-
-
Biskup, J.1
Brüggemann, H.H.2
-
8
-
-
0024868341
-
The personal model of data - towards a privacy oriented information system
-
Los Angeles, CA, USA, February
-
J. Biskup and H.H. Brüggemann, The personal model of data - towards a privacy oriented information system, in: Proc. of the Fifth International Conference on Data Engineering (ICDE 1989), Los Angeles, CA, USA, February 1989.
-
(1989)
Proc. of the Fifth International Conference on Data Engineering (ICDE 1989)
-
-
Biskup, J.1
Brüggemann, H.H.2
-
10
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
P.A. Bonatti and P. Samarati, A unified framework for regulating access and information release on the web, Journal of Computer Security 10(3) (2002), 241-272.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.A.1
Samarati, P.2
-
14
-
-
0038684367
-
-
O'Reilly & Associates, Sebastopol, CA, USA
-
L.F. Cranor, Web Privacy with P3P, O'Reilly & Associates, Sebastopol, CA, USA, 2002.
-
(2002)
Web Privacy with P3P
-
-
Cranor, L.F.1
-
15
-
-
24644439414
-
Extending policy languages to the semantic web
-
Munich, Germany, July
-
E. Damiani, S. De Capitani di Vimercati, C. Fugazza and P. Samarati, Extending policy languages to the semantic web, in: Proc. of the International Conference on Web Engineering, Munich, Germany, July 2004.
-
(2004)
Proc. of the International Conference on Web Engineering
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Fugazza, C.3
Samarati, P.4
-
16
-
-
48249127185
-
on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
23/11/1995, 031-050. Directive 95/46/ec of the European Parliament and of the council of 24 October
-
Directive 95/46/ec of the European Parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal L 281 (23/11/1995), 031-050.
-
(1995)
Official Journal L
, vol.281
-
-
-
17
-
-
12844287351
-
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
-
Heraklion, Greece, May
-
R. Gavriloaie, W. Nejdl, D. Olmedilla, K. Seamons and M. Winslett, No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web, in: Proc. of the First European Semantic Web Symposium, Heraklion, Greece, May 2004.
-
(2004)
Proc. of the First European Semantic Web Symposium
-
-
Gavriloaie, R.1
Nejdl, W.2
Olmedilla, D.3
Seamons, K.4
Winslett, M.5
-
18
-
-
84948735377
-
-
G. Karjoth and M. Schunter, Privacy policy model for enterprises, in: Proc. of the 15th IEEE Computer Security Foundations Workshop, Cape Breton, NS, Canada, June 2002.
-
G. Karjoth and M. Schunter, Privacy policy model for enterprises, in: Proc. of the 15th IEEE Computer Security Foundations Workshop, Cape Breton, NS, Canada, June 2002.
-
-
-
-
19
-
-
84948670934
-
Privacy-enabled services for enterprises
-
Aix-en-Provence, France, September
-
G. Karjoth, M. Schunter and M. Waidner, Privacy-enabled services for enterprises, in: Proc. of the 13th International Conference on Database and Expert Systems Applications (DEXA'02), Aix-en-Provence, France, September 2002.
-
(2002)
Proc. of the 13th International Conference on Database and Expert Systems Applications (DEXA'02)
-
-
Karjoth, G.1
Schunter, M.2
Waidner, M.3
-
20
-
-
70349159413
-
A privacy-enhanced attribute-based access control system
-
Redondo Beach, CA, USA, July
-
J. Kolter, R. Schillinger and G. Pernul, A privacy-enhanced attribute-based access control system, in: Proc. of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 2007.
-
(2007)
Proc. of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security
-
-
Kolter, J.1
Schillinger, R.2
Pernul, G.3
-
21
-
-
48249127552
-
-
Organization for Economic Co-operation and Development, OECD guidelines on the protection of privacy and transborder flows of personal data, http://www.oecd.org/document/18/0,2340,en_2649_ 34255_1815186_119820_1_1_1,00. html, 1980.
-
Organization for Economic Co-operation and Development, OECD guidelines on the protection of privacy and transborder flows of personal data, http://www.oecd.org/document/18/0,2340,en_2649_ 34255_1815186_119820_1_1_1,00. html, 1980.
-
-
-
-
23
-
-
30644473909
-
Adaptive trust negotiation and access control
-
Stockholm, Sweden, June
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead and K.E. Seamons, Adaptive trust negotiation and access control, in: Proc. of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, June 2005.
-
(2005)
Proc. of the 10th ACM Symposium on Access Control Models and Technologies
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
24
-
-
84964853055
-
-
P. Samarati and S. De Capitani di Vimercati, Access control: Policies, models, and mechanisms, in: Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, eds, LNCS, 2171, Springer-Verlag, Berlin, 2001, pp. 137-196.
-
P. Samarati and S. De Capitani di Vimercati, Access control: Policies, models, and mechanisms, in: Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, eds, LNCS, Vol. 2171, Springer-Verlag, Berlin, 2001, pp. 137-196.
-
-
-
-
25
-
-
0003324667
-
Internet credential acceptance policies
-
Leuven, Belgium, July
-
K.E. Seamons, W. Winsborough and M. Winslett, Internet credential acceptance policies, in: Proc. of the Workshop on Logic Programming for Internet Applications, Leuven, Belgium, July 1997.
-
(1997)
Proc. of the Workshop on Logic Programming for Internet Applications
-
-
Seamons, K.E.1
Winsborough, W.2
Winslett, M.3
-
26
-
-
24644455920
-
Privacy constraint processing in a privacy-enhanced database management system
-
B. Thuraisingham, Privacy constraint processing in a privacy-enhanced database management system, Data & Knowledge Engineering 55(2) (2005), 159-188.
-
(2005)
Data & Knowledge Engineering
, vol.55
, Issue.2
, pp. 159-188
-
-
Thuraisingham, B.1
-
27
-
-
33645997087
-
Mobile trust negotiation: Authentication and authorization in dynamic mobile networks
-
Lake Windermere, England, September
-
T.W. van der Horst, T. Sundelin, K.E. Seamons and C.D. Knutson, Mobile trust negotiation: Authentication and authorization in dynamic mobile networks, in: Proc. of the Eighth IFIP Conference on Communications and Multimedia Security, Lake Windermere, England, September 2004.
-
(2004)
Proc. of the Eighth IFIP Conference on Communications and Multimedia Security
-
-
van der Horst, T.W.1
Sundelin, T.2
Seamons, K.E.3
Knutson, C.D.4
-
28
-
-
84939548725
-
Automated trust negotiation
-
Hilton Head Island, SC, USA, January
-
W. Winsborough, K.E. Seamons and V. Jones, Automated trust negotiation, in: Proc. of the DARPA Information Survivability Conf. & Exposition, Hilton Head Island, SC, USA, January 2000.
-
(2000)
Proc. of the DARPA Information Survivability Conf. & Exposition
-
-
Winsborough, W.1
Seamons, K.E.2
Jones, V.3
-
29
-
-
0030698978
-
Assuring security and privacy for digital library transactions on the web: Client and server security policies
-
Washington, DC, USA, May
-
M. Winslett, N. Ching, V. Jones and I. Slepchin, Assuring security and privacy for digital library transactions on the web: Client and server security policies, in: Proc. of the ADL'97 - Forum on Research and Tech. Advances in Digital Libraries, Washington, DC, USA, May 1997.
-
(1997)
Proc. of the ADL'97 - Forum on Research and Tech. Advances in Digital Libraries
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin, I.4
-
32
-
-
33644587121
-
-
M. Youssef, V. Atluri and N.R. Adam, Preserving mobile customer privacy: An access control system for moving objects and customer profiles, in: Proc. of the 6th International Conference on Mobile Data Management, Ayia Napa, Cyprus, May 2005.
-
M. Youssef, V. Atluri and N.R. Adam, Preserving mobile customer privacy: An access control system for moving objects and customer profiles, in: Proc. of the 6th International Conference on Mobile Data Management, Ayia Napa, Cyprus, May 2005.
-
-
-
-
33
-
-
0034449542
-
An efficient complete strategy for automated trust negotiation over the internet
-
Athens, Greece, November
-
T. Yu, X. Ma and M. Winslett, An efficient complete strategy for automated trust negotiation over the internet, in: Proc. of the 7th ACM Computer and Communication Security, Athens, Greece, November 2000.
-
(2000)
Proc. of the 7th ACM Computer and Communication Security
-
-
Yu, T.1
Ma, X.2
Winslett, M.3
-
34
-
-
84954418287
-
A unified scheme for resource protection in automated trust negotiation
-
Berkeley, CA, May
-
T. Yu and M. Winslett, A unified scheme for resource protection in automated trust negotiation, in: Proc. of the IEEE Symposium on Security and Privacy, Berkeley, CA, May 2003.
-
(2003)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Yu, T.1
Winslett, M.2
-
35
-
-
0035747337
-
Interoperable strategies in automated trust negotiation
-
Philadelphia, PA, USA, November
-
T. Yu, M. Winslett and K.E. Seamons, Interoperable strategies in automated trust negotiation, in: ACM Conference on Computer and Communications Security (CCS 2001), Philadelphia, PA, USA, November 2001.
-
(2001)
ACM Conference on Computer and Communications Security (CCS 2001)
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
36
-
-
1642327001
-
Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust
-
T. Yu, M. Winslett and K.E. Seamons, Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust, ACM Transactions on Information and System Security (TISSEC) 6(1) (2003), 1-42.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|