메뉴 건너뛰기




Volumn 16, Issue 4, 2008, Pages 369-397

A privacy-aware access control system

Author keywords

Access control; Data handling policies; Privacy

Indexed keywords

ACCESS CONTROL; DATA HANDLING; DATA PRIVACY; SECURITY SYSTEMS;

EID: 48249091293     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2008-0328     Document Type: Article
Times cited : (83)

References (36)
  • 7
    • 0024135278 scopus 로고
    • The personal model of data: Towards a privacy oriented information system
    • J. Biskup and H.H. Brüggemann, The personal model of data: Towards a privacy oriented information system, Computers & Security 7 (1988), 575-597.
    • (1988) Computers & Security , vol.7 , pp. 575-597
    • Biskup, J.1    Brüggemann, H.H.2
  • 10
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the web
    • P.A. Bonatti and P. Samarati, A unified framework for regulating access and information release on the web, Journal of Computer Security 10(3) (2002), 241-272.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.A.1    Samarati, P.2
  • 14
    • 0038684367 scopus 로고    scopus 로고
    • O'Reilly & Associates, Sebastopol, CA, USA
    • L.F. Cranor, Web Privacy with P3P, O'Reilly & Associates, Sebastopol, CA, USA, 2002.
    • (2002) Web Privacy with P3P
    • Cranor, L.F.1
  • 16
    • 48249127185 scopus 로고
    • on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • 23/11/1995, 031-050. Directive 95/46/ec of the European Parliament and of the council of 24 October
    • Directive 95/46/ec of the European Parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal L 281 (23/11/1995), 031-050.
    • (1995) Official Journal L , vol.281
  • 17
    • 12844287351 scopus 로고    scopus 로고
    • No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
    • Heraklion, Greece, May
    • R. Gavriloaie, W. Nejdl, D. Olmedilla, K. Seamons and M. Winslett, No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web, in: Proc. of the First European Semantic Web Symposium, Heraklion, Greece, May 2004.
    • (2004) Proc. of the First European Semantic Web Symposium
    • Gavriloaie, R.1    Nejdl, W.2    Olmedilla, D.3    Seamons, K.4    Winslett, M.5
  • 18
    • 84948735377 scopus 로고    scopus 로고
    • G. Karjoth and M. Schunter, Privacy policy model for enterprises, in: Proc. of the 15th IEEE Computer Security Foundations Workshop, Cape Breton, NS, Canada, June 2002.
    • G. Karjoth and M. Schunter, Privacy policy model for enterprises, in: Proc. of the 15th IEEE Computer Security Foundations Workshop, Cape Breton, NS, Canada, June 2002.
  • 21
    • 48249127552 scopus 로고    scopus 로고
    • Organization for Economic Co-operation and Development, OECD guidelines on the protection of privacy and transborder flows of personal data, http://www.oecd.org/document/18/0,2340,en_2649_ 34255_1815186_119820_1_1_1,00. html, 1980.
    • Organization for Economic Co-operation and Development, OECD guidelines on the protection of privacy and transborder flows of personal data, http://www.oecd.org/document/18/0,2340,en_2649_ 34255_1815186_119820_1_1_1,00. html, 1980.
  • 24
    • 84964853055 scopus 로고    scopus 로고
    • P. Samarati and S. De Capitani di Vimercati, Access control: Policies, models, and mechanisms, in: Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, eds, LNCS, 2171, Springer-Verlag, Berlin, 2001, pp. 137-196.
    • P. Samarati and S. De Capitani di Vimercati, Access control: Policies, models, and mechanisms, in: Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, eds, LNCS, Vol. 2171, Springer-Verlag, Berlin, 2001, pp. 137-196.
  • 26
    • 24644455920 scopus 로고    scopus 로고
    • Privacy constraint processing in a privacy-enhanced database management system
    • B. Thuraisingham, Privacy constraint processing in a privacy-enhanced database management system, Data & Knowledge Engineering 55(2) (2005), 159-188.
    • (2005) Data & Knowledge Engineering , vol.55 , Issue.2 , pp. 159-188
    • Thuraisingham, B.1
  • 32
    • 33644587121 scopus 로고    scopus 로고
    • M. Youssef, V. Atluri and N.R. Adam, Preserving mobile customer privacy: An access control system for moving objects and customer profiles, in: Proc. of the 6th International Conference on Mobile Data Management, Ayia Napa, Cyprus, May 2005.
    • M. Youssef, V. Atluri and N.R. Adam, Preserving mobile customer privacy: An access control system for moving objects and customer profiles, in: Proc. of the 6th International Conference on Mobile Data Management, Ayia Napa, Cyprus, May 2005.
  • 33
    • 0034449542 scopus 로고    scopus 로고
    • An efficient complete strategy for automated trust negotiation over the internet
    • Athens, Greece, November
    • T. Yu, X. Ma and M. Winslett, An efficient complete strategy for automated trust negotiation over the internet, in: Proc. of the 7th ACM Computer and Communication Security, Athens, Greece, November 2000.
    • (2000) Proc. of the 7th ACM Computer and Communication Security
    • Yu, T.1    Ma, X.2    Winslett, M.3
  • 34
    • 84954418287 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • Berkeley, CA, May
    • T. Yu and M. Winslett, A unified scheme for resource protection in automated trust negotiation, in: Proc. of the IEEE Symposium on Security and Privacy, Berkeley, CA, May 2003.
    • (2003) Proc. of the IEEE Symposium on Security and Privacy
    • Yu, T.1    Winslett, M.2
  • 36
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust
    • T. Yu, M. Winslett and K.E. Seamons, Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust, ACM Transactions on Information and System Security (TISSEC) 6(1) (2003), 1-42.
    • (2003) ACM Transactions on Information and System Security (TISSEC) , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.