메뉴 건너뛰기




Volumn , Issue , 2008, Pages 400-407

Semantic enforcement of privacy protection policies via the combination of ontologies and rules

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; ELECTRIC BREAKDOWN; INFORMATION MANAGEMENT; INFORMATION THEORY; SENSOR NETWORKS; SENSORS; UBIQUITOUS COMPUTING;

EID: 50949084465     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SUTC.2008.59     Document Type: Conference Paper
Times cited : (12)

References (29)
  • 2
    • 34547332566 scopus 로고    scopus 로고
    • A roadmap for comprehensive online for privacy policy management
    • July
    • I. A. Antón et al. A roadmap for comprehensive online for privacy policy management. Comm. of the ACM, 50(7):109-116, July 2007.
    • (2007) Comm. of the ACM , vol.50 , Issue.7 , pp. 109-116
    • Antón, I.A.1
  • 3
    • 84882734978 scopus 로고    scopus 로고
    • Rule-based policy specification
    • T. Yu and S. Jajodia, editors, Springer
    • G. Antoniou et al. Rule-based policy specification. In T. Yu and S. Jajodia, editors, Secure Data Management in Decentralized Systems, pages 169-216. Springer, 2007.
    • (2007) Secure Data Management in Decentralized Systems , pp. 169-216
    • Antoniou, G.1
  • 4
    • 84958048748 scopus 로고    scopus 로고
    • Compliance checking in the policymaker trust management system
    • Proc. of the Financial Cryptography, Springer
    • M. Blaze, J. Figenebaum, and M. Strauss. Compliance checking in the policymaker trust management system. In Proc. of the Financial Cryptography, LNCS 1465, pages 254-274. Springer, 1998.
    • (1998) LNCS , vol.1465 , pp. 254-274
    • Blaze, M.1    Figenebaum, J.2    Strauss, M.3
  • 6
    • 70349315832 scopus 로고    scopus 로고
    • Semantic web policies - a discussion of requirements and research issues
    • Budva, Montenergro, June
    • A. P. Bonatti et al. Semantic web policies - a discussion of requirements and research issues. In 3rd European Semantic Web Conference (ESWC 2006), Budva, Montenergro, June 2006.
    • (2006) 3rd European Semantic Web Conference (ESWC 2006)
    • Bonatti, A.P.1
  • 8
    • 50949083114 scopus 로고    scopus 로고
    • L. Cranor, M. Langheinrich, and M. Marchiori. A p3p preference exchange language 1.0 (appel 1.0), 2002. http://www.w3.org/TR/P3P-preferences/.
    • L. Cranor, M. Langheinrich, and M. Marchiori. A p3p preference exchange language 1.0 (appel 1.0), 2002. http://www.w3.org/TR/P3P-preferences/.
  • 9
    • 0032070541 scopus 로고    scopus 로고
    • AL-log: Integrating datalog and description logics
    • M. F. Donini et al. AL-log: Integrating datalog and description logics. Journal of Intelligent Information Systems, 10(3):227-252, 1998.
    • (1998) Journal of Intelligent Information Systems , vol.10 , Issue.3 , pp. 227-252
    • Donini, M.F.1
  • 10
    • 0013176783 scopus 로고    scopus 로고
    • IT-Security and Privacy - Design and Use of Privacy-Enhancing Security Mechanisms
    • Springer
    • S. Fischer-Hübner. IT-Security and Privacy - Design and Use of Privacy-Enhancing Security Mechanisms. LNCS 1958. Springer, 2001.
    • (2001) LNCS 1958
    • Fischer-Hübner, S.1
  • 11
    • 84880493386 scopus 로고    scopus 로고
    • Description logic programs: Combining logic programs with description logic
    • Budapest, Hungary
    • N. B. Grosof et al. Description logic programs: Combining logic programs with description logic. In World Wide Web 2003, pages 48-65, Budapest, Hungary, 2003.
    • (2003) World Wide Web 2003 , pp. 48-65
    • Grosof, N.B.1
  • 13
    • 0001619596 scopus 로고    scopus 로고
    • Flexible support for multiple access control policies
    • June
    • S. Jajodia et al. Flexible support for multiple access control policies. ACM Trans. on Database Systems, 26(2):214-260, June 2001.
    • (2001) ACM Trans. on Database Systems , vol.26 , Issue.2 , pp. 214-260
    • Jajodia, S.1
  • 14
    • 0242276201 scopus 로고    scopus 로고
    • A policy based approach to security for the semantic web
    • International Semantic Web Conference (ISWC) 2003
    • L. Kagal, T. Finin, and A. Joshi. A policy based approach to security for the semantic web. In International Semantic Web Conference (ISWC) 2003, LNCS 2870, pages 402-418, 2003.
    • (2003) LNCS , vol.2870 , pp. 402-418
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 16
    • 2342618084 scopus 로고    scopus 로고
    • Platform for enterprise privacy practices: Privacy-enabled management of customer data
    • 2nd Workshop on Privacy Enhancing Technologies PET, Springer
    • G. Karjoth, M. Schunter, and M. Waidner. Platform for enterprise privacy practices: Privacy-enabled management of customer data. In 2nd Workshop on Privacy Enhancing Technologies (PET), LNCS. Springer, 2002.
    • (2002) LNCS
    • Karjoth, G.1    Schunter, M.2    Waidner, M.3
  • 18
    • 50949111029 scopus 로고    scopus 로고
    • J. Maluszynski. Hybrid integration of rules and dl-based ontologies. In J. Maluszynski, editor, Combining Rules and Ontologies. A survey, pages 55-72. EU FP6 Network of Excellence (NoE), Feb. 2005. REWERSE.
    • J. Maluszynski. Hybrid integration of rules and dl-based ontologies. In J. Maluszynski, editor, Combining Rules and Ontologies. A survey, pages 55-72. EU FP6 Network of Excellence (NoE), Feb. 2005. REWERSE.
  • 19
    • 33845431597 scopus 로고    scopus 로고
    • Can owl and logic programming live together happily ever after?
    • 5th International Semantic Web Conference (ISWC) 2006, Athens, GA, USA, Nov
    • B. Motik et al. Can owl and logic programming live together happily ever after? In 5th International Semantic Web Conference (ISWC) 2006, LNCS 4273, Athens, GA, USA, Nov. 2006.
    • (2006) LNCS , vol.4273
    • Motik, B.1
  • 20
    • 35048890555 scopus 로고    scopus 로고
    • Query answering for owl-dl with rules
    • 3rd International Semantic Web Conference (ISWC) 2004, Springer
    • B. Motik, U. Sattler, and R. Studer. Query answering for owl-dl with rules. In 3rd International Semantic Web Conference (ISWC) 2004, LNCS 3298, pages 549-563. Springer, 2004.
    • (2004) LNCS , vol.3298 , pp. 549-563
    • Motik, B.1    Sattler, U.2    Studer, R.3
  • 24
    • 33749985726 scopus 로고    scopus 로고
    • Integrating ontologies and rules: Semantic and computational issues
    • Reasoning Web 2006
    • R. Rosati. Integrating ontologies and rules: Semantic and computational issues. In Reasoning Web 2006, LNCS 4126, pages 128-151, 2006.
    • (2006) LNCS , vol.4126 , pp. 128-151
    • Rosati, R.1
  • 25
    • 0242308055 scopus 로고    scopus 로고
    • Semantic web languages for policy representation and reasoning: A comparison of kaos, rei, and ponder
    • 2nd International Semantic Web Conference (ISWC) 2003
    • G. Tonti et al. Semantic web languages for policy representation and reasoning: A comparison of kaos, rei, and ponder. In 2nd International Semantic Web Conference (ISWC) 2003, LNCS 2870, pages 419-437, 2003.
    • (2003) LNCS , vol.2870 , pp. 419-437
    • Tonti, G.1
  • 26
    • 84875664448 scopus 로고    scopus 로고
    • Access control policies and languages in open environments
    • T. Yu and S. Jajodia, editors, Springer
    • S. D. C. d. Vimercati et al. Access control policies and languages in open environments. In T. Yu and S. Jajodia, editors, Secure Data Management in Decentralized Systems, pages 21-58. Springer, 2007.
    • (2007) Secure Data Management in Decentralized Systems , pp. 21-58
    • Vimercati, S.D.C.D.1
  • 27
    • 84899266027 scopus 로고    scopus 로고
    • Creating a policy-aware web: Discretionary, rule-based access for the world wide web
    • E. Ferrari and B. Thuraisingham, editors, Idea Group Inc
    • D. J. Weitzner et al. Creating a policy-aware web: Discretionary, rule-based access for the world wide web. In E. Ferrari and B. Thuraisingham, editors, Web and Information Security, pages 1-31. Idea Group Inc., 2006.
    • (2006) Web and Information Security , pp. 1-31
    • Weitzner, D.J.1
  • 28
    • 84974750564 scopus 로고
    • Authorization in distributed systems: A new approach
    • Y. C. T. Woo and S. S. Lam. Authorization in distributed systems: a new approach. Journal of Computer Security, 2(2-3):107-136, 1993.
    • (1993) Journal of Computer Security , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, Y.C.T.1    Lam, S.S.2
  • 29
    • 33646394155 scopus 로고    scopus 로고
    • A formal semantics for p3p
    • Fairfax, VA, USA, Oct
    • T. Yu, A. N. Li, and I. Antón. A formal semantics for p3p. In ACM Workshop on Secure Web Services, Fairfax, VA, USA, Oct. 2004. http://citeseer.ist.psu.edu/750176.html.
    • (2004) ACM Workshop on Secure Web Services
    • Yu, T.1    Li, A.N.2    Antón, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.