-
1
-
-
0142157015
-
A toolkit for managing enterprise privacy policies
-
M. Backcs, B. Pfitzmann, and M. Schuntcr. A toolkit for managing enterprise privacy policies. In ESORICS, pages 162-180, 2003.
-
(2003)
ESORICS
, pp. 162-180
-
-
Backcs, M.1
Pfitzmann, B.2
Schuntcr, M.3
-
2
-
-
33751063543
-
-
A. Barlh, A. Datta, J. C. Mitchell, and H. Nissenhaum. Privacy and contextualintegrity: Framework and applications. In S&P, pages 184-198. IEEE Computer Society, 2006.
-
A. Barlh, A. Datta, J. C. Mitchell, and H. Nissenhaum. Privacy and contextualintegrity: Framework and applications. In S&P, pages 184-198. IEEE Computer Society, 2006.
-
-
-
-
3
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
E. Bertino, C. Bellini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst, 23(3):231-285, 1998.
-
(1998)
ACM Trans. Database Syst
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bellini, C.2
Ferrari, E.3
Samarati, P.4
-
4
-
-
84944792110
-
Trbae: A temporal role-based access control model
-
E. Bertino, P. A. Bonalli, and E. Ferrari. Trbae: A temporal role-based access control model. ACM Trans, Inf. Syst. Secur., 4(3):191-233, 2001.
-
(2001)
ACM Trans, Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonalli, P.A.2
Ferrari, E.3
-
5
-
-
84893077785
-
Obligation monitoring in policy management
-
Washington, DC, USA, IEEE Computer Society
-
C. Bellini, S. Jajodia, X. Wang, and D. Wijesekera. Obligation monitoring in policy management. In POLICY '02: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02), page 2, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
POLICY '02: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
, pp. 2
-
-
Bellini, C.1
Jajodia, S.2
Wang, X.3
Wijesekera, D.4
-
6
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
VLDB Endowment
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy management and security applications. In VLDB '02: Proceedings of the 28th international conference on Very Large Data Bases, pages 502-513. VLDB Endowment, 2002.
-
(2002)
VLDB '02: Proceedings of the 28th international conference on Very Large Data Bases
, pp. 502-513
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
7
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
Morgan Kaufmann
-
C. Bettini, S. Jajodia. X. S. Wang, and D. Wijesekera. Provisions and obligations in policy management and security applications. In VLDB, pages 502-513. Morgan Kaufmann, 2002.
-
(2002)
VLDB
, pp. 502-513
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
8
-
-
0345829056
-
Provisions and obligations in policy rule management
-
C. Bettini, S. Jajodia. X. S. Wang, and D. Wijesekera. Provisions and obligations in policy rule management. J. Network Syst. Manage., 11(3), 2003.
-
(2003)
J. Network Syst. Manage
, vol.11
, Issue.3
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
9
-
-
84937327297
-
Conditional obligation and positive permission for agents in time
-
52
-
M. A. Brown. Conditional obligation and positive permission for agents in time. Nordic Journal of Philosophical Logic, 5(2):83-l 12, 2000.
-
(2000)
Nordic Journal of Philosophical Logic
, vol.83-l
, pp. 12
-
-
Brown, M.A.1
-
10
-
-
84944048132
-
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The ponder policy specification language. In M. Sloman, J. Lobo, and E. Lupu, editors, POLICY, 1995 of Lecture Notes in Computer Science, pages 18-38. Springer, 2001.
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The ponder policy specification language. In M. Sloman, J. Lobo, and E. Lupu, editors, POLICY, volume 1995 of Lecture Notes in Computer Science, pages 18-38. Springer, 2001.
-
-
-
-
11
-
-
38049083819
-
Obligations and their interaction with programs
-
J. Biskup and J. Lopez, editors, ESORICS. of, Springer
-
D. J. Dougherty, K. Fisler, and S. Krishnamurthi. Obligations and their interaction with programs. In J. Biskup and J. Lopez, editors, ESORICS. volume 4734 of Lecture Notes in Computer Science, pages 375-389. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4734
, pp. 375-389
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
12
-
-
57349087822
-
-
Federal Trade Commision, online privacy protection act of 1998. Available at
-
Federal Trade Commision. Children's online privacy protection act of 1998. Available at http://www.cdt.org/legislation/105lh/privacy/coppa.html.
-
Children's
-
-
-
13
-
-
84992227458
-
Proposed nist standard for role-based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur., 4(3):224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
14
-
-
33744982882
-
Obligation policies: An enforcement platform
-
IEEE Computer Society
-
J P. Garna and P. Ferreira. Obligation policies: An enforcement platform. In POLICY, pages 203-212. IEEE Computer Society, 2005.
-
(2005)
POLICY
, pp. 203-212
-
-
Garna, J.P.1
Ferreira, P.2
-
15
-
-
33646071594
-
On obligations
-
S. D. C. di Vimereati, P. F. Syvcrson, and D. Gollmann, editors, ESORICS, of, Springer
-
M. Hilty, D. A. Basin, and A. Pretschner. On obligations. In S. D. C. di Vimereati, P. F. Syvcrson, and D. Gollmann, editors, ESORICS, volume 3679 of Lecture Notes in Computer Science, pages 98-117. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3679
, pp. 98-117
-
-
Hilty, M.1
Basin, D.A.2
Pretschner, A.3
-
17
-
-
34547346853
-
On the modeling and analysis of obligations
-
New York, NY, USA, ACM
-
K. Irwin, T. Yu, and W. H. Winsborough. On the modeling and analysis of obligations. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 134-143, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM conference on Computer and communications security
, pp. 134-143
-
-
Irwin, K.1
Yu, T.2
Winsborough, W.H.3
-
18
-
-
17444406680
-
A generalized temporal role-based access control model
-
J. Joshi, E. Bertino, U. Latif, and A. Ghafoor. A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng., 17(1):4-23, 2005.
-
(2005)
IEEE Trans. Knowl. Data Eng
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
19
-
-
84893084758
-
A policy language for a pervasive computing environment
-
Washington, DC, USA, IEEE Computer Society
-
L. Kagal, T. Finin, and A. Joshi. A policy language for a pervasive computing environment. In POLICY '03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, page 63, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
POLICY '03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 63
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
20
-
-
38049002527
-
Conditional privacy-aware role based access control
-
Springer
-
Q- Ni, D. Lin, E, Bertino, and J. Lobo. Conditional privacy-aware role based access control. In ESORICS '07: Proceedings of the 12th European Symposium On Research In Computer Security, pages 72-89. Springer, 2007.
-
(2007)
ESORICS '07: Proceedings of the 12th European Symposium On Research In Computer Security
, pp. 72-89
-
-
Ni, Q.1
Lin, D.2
Bertino, E.3
Lobo, J.4
-
21
-
-
34548016110
-
Privcy aware role based access control
-
New York, NY, USA, ACM Press
-
Q. Ni, A. Tromhetta. E. Bertino, and J. Lobo. Privcy aware role based access control. In SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, New York, NY, USA, 2007. ACM Press.
-
(2007)
SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies
-
-
Ni, Q.1
Tromhetta, A.2
Bertino, E.3
Lobo, J.4
-
23
-
-
0003076271
-
Contrary-to-duty obligations
-
H. Prakken and M. J. Sergot. Contrary-to-duty obligations. Studia Logica, 57(1):91-115, 1996.
-
(1996)
Studia Logica
, vol.57
, Issue.1
, pp. 91-115
-
-
Prakken, H.1
Sergot, M.J.2
-
24
-
-
57349154379
-
-
M. Sailer and M. Morciniec. Monitoring and execution for contract compliance. HPL-2001-261R1, HP LAB, HP. Available at http://www.hpl.hp.eom/ techreports/2001/HPL-2001-261Rl.htm.
-
M. Sailer and M. Morciniec. Monitoring and execution for contract compliance. HPL-2001-261R1, HP LAB, HP. Available at http://www.hpl.hp.eom/ techreports/2001/HPL-2001-261Rl.htm.
-
-
-
-
25
-
-
57349117779
-
-
and, editors, Springer
-
P- Samarati, P. Y A. Ryan, D. Gollmann, and R. Molva, editors. Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, volume 3193 of Lecture Notes in Computer Science. Springer, 2004.
-
(2004)
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, volume 3193 of Lecture Notes in Computer Science
-
-
-
26
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
27
-
-
34748896011
-
-
J. Skene, A. Skene, J. Cramplon, and W. Emmerich. The monitorabilily of service-level agreements for application-service provision. In V. Cortellessa, S. Uchitel, andD. Yankelevich, editors, WOSP, pages 3-14. ACM, 2007.
-
J. Skene, A. Skene, J. Cramplon, and W. Emmerich. The monitorabilily of service-level agreements for application-service provision. In V. Cortellessa, S. Uchitel, andD. Yankelevich, editors, WOSP, pages 3-14. ACM, 2007.
-
-
-
-
28
-
-
57349165488
-
-
United State Department of Health. Health insurance portability and accountability act of 1996. Available at http://www.hhs.gov/ocr/hipaa/.
-
United State Department of Health. Health insurance portability and accountability act of 1996. Available at http://www.hhs.gov/ocr/hipaa/.
-
-
-
-
29
-
-
34548013268
-
-
U.S. Senate Committee on Banking, Information regarding the gramm-leach-bliley act of, Available at
-
U.S. Senate Committee on Banking, Housing, and Urban Affairs. Information regarding the gramm-leach-bliley act of 1999. Available at http://banking. senate.gov/conf/.
-
(1999)
Housing, and Urban Affairs
-
-
-
30
-
-
37149051976
-
-
A. Uszok, J. Bradshaw, R. Jeffers, N. Suri, P. Hayes, M. Breedy, L. Bunch, M. Johnson, S. Kulkarni, and J. Lott. Kaos policy and domain services: Toward a description-logic approach to policy representation, deconflietion, and enforcement, policy, 00:93, 2003.
-
A. Uszok, J. Bradshaw, R. Jeffers, N. Suri, P. Hayes, M. Breedy, L. Bunch, M. Johnson, S. Kulkarni, and J. Lott. Kaos policy and domain services: Toward a description-logic approach to policy representation, deconflietion, and enforcement, policy, 00:93, 2003.
-
-
-
|