-
1
-
-
48249091293
-
A privacy-aware access control system
-
to appear
-
Ardagna, C., Cremonini, M., De Capitani di Vimercati, S., Samarati, P.: A privacy-aware access control system. Journal of Computer Security (JCS) (to appear, 2008)
-
(2008)
Journal of Computer Security (JCS)
-
-
Ardagna, C.1
Cremonini, M.2
De Capitani di Vimercati, S.3
Samarati, P.4
-
2
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
Hong Kong, China, August
-
Bettini, C., Jajodia, S., Wang, X.S., Wijesekera, D.: Provisions and obligations in policy management and security applications. In: Proc. of the 28th Conference Very Large Data Bases (VLDB 2002), Hong Kong, China, (August 2002)
-
(2002)
Proc. of the 28th Conference Very Large Data Bases (VLDB
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
3
-
-
80052739562
-
Towards improved privacy policy coverage in healthcare using policy refinement
-
Vienna, Austria September
-
Bhatti, R., Grandison, T.: Towards improved privacy policy coverage in healthcare using policy refinement. In: Proc. of the 4th VLDB Workshop on Secure Data Management 2007, Vienna, Austria (September 2007)
-
(2007)
Proc. of the 4th VLDB Workshop on Secure Data Management
-
-
Bhatti, R.1
Grandison, T.2
-
4
-
-
50249176785
-
An access control system for data archives
-
Paris, France June
-
Bonatti, P., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: An access control system for data archives. In: Proc. of the 16th International Conference on Information Security, Paris, France (June 2001)
-
(2001)
Proc. of the 16th International Conference on Information Security
-
-
Bonatti, P.1
Damiani, E.2
De Capitani di Vimercati, S.3
Samarati, P.4
-
5
-
-
84949223915
-
A component-based architecture for secure data publication
-
New Orleans, Louisiana, USA December
-
Bonatti, P., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: A component-based architecture for secure data publication. In: Proc. of the 17th Annual Computer Security Applications Conference (ACSAC 2001), New Orleans, Louisiana, USA (December 2001)
-
(2001)
Proc. of the 17th Annual Computer Security Applications Conference (ACSAC
-
-
Bonatti, P.1
Damiani, E.2
De Capitani di Vimercati, S.3
Samarati, P.4
-
6
-
-
85025424440
-
An algebra for composing access control policies
-
Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An algebra for composing access control policies. ACM Transactions on Information and System Security 5(1), 1-35 (2002)
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
De Capitani di Vimercati, S.2
Samarati, P.3
-
7
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
Bonatti, P., Samarati, P.: A unified framework for regulating access and information release on the web. Journal of Computer Security (JCS) 10(3), 241-272 (2002)
-
(2002)
Journal of Computer Security (JCS)
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
8
-
-
33745921913
-
Dealing with Privacy Obligations: Important Aspects and Technical Approaches
-
Katsikas, S.K, López, J, Pernul, G, eds, TrustBus 2004, Springer, Heidelberg
-
Casassa Mont, M.: Dealing with Privacy Obligations: Important Aspects and Technical Approaches. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3184
-
-
Casassa Mont, M.1
-
10
-
-
50249184294
-
-
eXtensible Access Control Markup Language (XACML) Version 2.0 February 2005
-
eXtensible Access Control Markup Language (XACML) Version 2.0 (February 2005), http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec- os.pdf
-
-
-
-
12
-
-
84888038222
-
The impact of industry constraints on model-driven data disclosure controls
-
Nashville, Tennessee, USA September
-
Grandison, T., Davis, J.: The impact of industry constraints on model-driven data disclosure controls. In: Proc. of the 1st International Workshop on Model-Based Trustworthy Health Information Systems (MOTHIS) 2007, Nashville, Tennessee, USA (September 2007)
-
(2007)
Proc. of the 1st International Workshop on Model-Based Trustworthy Health Information Systems (MOTHIS)
-
-
Grandison, T.1
Davis, J.2
-
13
-
-
33750321755
-
Criticality aware access control model for pervasive applications
-
Pisa, Italy March
-
Gupta, S., Mukherjee, T., Venkatasubramanian, K.: Criticality aware access control model for pervasive applications. In: Proc. of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM 2006), Pisa, Italy (March 2006)
-
(2006)
Proc. of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM
-
-
Gupta, S.1
Mukherjee, T.2
Venkatasubramanian, K.3
-
14
-
-
34247096126
-
Managing exceptions in the medical workflow systems
-
Shanghai, China May
-
Han, M., Thiery, T., Song, X.: Managing exceptions in the medical workflow systems. In: Proc. of the 28th international conference on Software engineering (ICSE 2006), Shanghai, China (May 2006)
-
(2006)
Proc. of the 28th international conference on Software engineering (ICSE
-
-
Han, M.1
Thiery, T.2
Song, X.3
-
16
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia, S., Samarati, P., Sapino, M., Subrahmanian, V.: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2), 214-260 (2001)
-
(2001)
ACM Trans. Database Syst
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmanian, V.4
-
17
-
-
33748036055
-
Redirection policies for mission-based information sharing
-
Lake Tahoe, California, USA June
-
Keppler, D., Swarup, V., Jajodia, S.: Redirection policies for mission-based information sharing. In: Proc. of the ACM Symposium on Access control Models and Technologies (SACMAT 2006), Lake Tahoe, California, USA (June 2006)
-
(2006)
Proc. of the ACM Symposium on Access control Models and Technologies (SACMAT
-
-
Keppler, D.1
Swarup, V.2
Jajodia, S.3
-
18
-
-
0032024112
-
Adeptflex-supporting dynamic changes of workflows without losing control
-
Reichert, M., Dadam, P.: Adeptflex-supporting dynamic changes of workflows without losing control. Journal of Intelligent Information Systems (JIIS) 10(2), 93-129 (1998)
-
(1998)
Journal of Intelligent Information Systems (JIIS)
, vol.10
, Issue.2
, pp. 93-129
-
-
Reichert, M.1
Dadam, P.2
-
20
-
-
0033652039
-
The NIST model for role based access control: Towards a unified standard
-
Berlin, Germany July
-
Sandhu, R., Ferraiolo, D., Kuhn, D.: The NIST model for role based access control: Towards a unified standard. In: Proc. of the 5th ACM Workshop on Role Based Access Control, Berlin, Germany (July 2000)
-
(2000)
Proc. of the 5th ACM Workshop on Role Based Access Control
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, D.3
|