-
2
-
-
77954482605
-
-
Cadence SMV
-
Cadence SMV, 2009. http://www.kenmcmil.com/.
-
(2009)
-
-
-
5
-
-
77954490524
-
Toward a Formal Characterization of Policy Specification Analysis
-
A. Bandara, J. Lobo, S. Calo, E. Lupu, A. Russo, and M. Sloman. Toward a Formal Characterization of Policy Specification Analysis. In Annual Conference of ITA (ACITA), University of Maryland, USA, September 2007.
-
Annual Conference of ITA (ACITA), University of Maryland, USA, September 2007
-
-
Bandara, A.1
Lobo, J.2
Calo, S.3
Lupu, E.4
Russo, A.5
Sloman, M.6
-
6
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
0
-
A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum. Privacy and contextual integrity: Framework and applications. Security and Privacy, IEEE Symposium on, 0:184-198, 2006.
-
(2006)
Security and Privacy, IEEE Symposium on
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
7
-
-
0345829056
-
Provisions and obligations in policy rule management
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy rule management. J. Netw. Syst. Manage., 11(3):351-372, 2003.
-
(2003)
J. Netw. Syst. Manage.
, vol.11
, Issue.3
, pp. 351-372
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
8
-
-
35048900689
-
20 states and beyond
-
20 states and beyond. Inf. Comput, 98(2):142-170, 1992.
-
(1992)
Inf. Comput
, vol.98
, Issue.2
, pp. 142-170
-
-
Burch, J.R.1
Clarke, E.M.2
McMillan, K.L.3
Dill, D.L.4
Hwang, L.J.5
-
9
-
-
84944048132
-
The Ponder Policy Specification Language
-
Springer-Verlag
-
D. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In 2nd International Workshop on Policies for Distributed Systems and Networks, Bristol, UK, Jan. 2001. Springer-Verlag.
-
2nd International Workshop on Policies for Distributed Systems and Networks, Bristol, UK, Jan. 2001
-
-
Damianou, D.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
10
-
-
38049083819
-
Obligations and their interaction with programs
-
D. J. Dougherty, K. Fisler, and S. Krishnamurthi. Obligations and their interaction with programs. In CESORICS '07: Proceedings of the 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pages 375-389, 2007.
-
(2007)
CESORICS '07: Proceedings of the 12th European Symposium on Research in Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings
, pp. 375-389
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
12
-
-
0005858785
-
-
Health Resources and Services Administration. Public Law
-
Health Resources and Services Administration. Health insurance portability and accountability act, 1996. Public Law 104-191.
-
(1996)
Health Insurance Portability and Accountability Act
, pp. 104-191
-
-
-
13
-
-
34547346853
-
On the modeling and analysis of obligations
-
New York, NY, USA, ACM
-
K. Irwin, T. Yu, and W. H. Winsborough. On the modeling and analysis of obligations. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 134-143, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 134-143
-
-
Irwin, K.1
Yu, T.2
Winsborough, W.H.3
-
14
-
-
44149127452
-
Assigning responsibilities for failed obligations
-
Springer Boston
-
K. Irwin, T. Yu, and W. H. Winsborough. Assigning responsibilities for failed obligations. In iTrust '08: IFIPTM Joined iTrust and PST Conference on Privacy, Trust Management and Security, pages 327-342. Springer Boston, 2008.
-
(2008)
iTrust '08: IFIPTM Joined iTrust and PST Conference on Privacy, Trust Management and Security
, pp. 327-342
-
-
Irwin, K.1
Yu, T.2
Winsborough, W.H.3
-
15
-
-
77954490902
-
On the relationship between permission and obligation
-
New York, NY, USA, ACM
-
A. J. I. Jones. On the relationship between permission and obligation. In ICAIL '87: Proceedings of the 1st international conference on Artificial intelligence and law, pages 164-169, New York, NY, USA, 1987. ACM.
-
(1987)
ICAIL '87: Proceedings of the 1st International Conference on Artificial Intelligence and Law
, pp. 164-169
-
-
Jones, A.J.I.1
-
16
-
-
33947620690
-
Privacy APIs: Access control techniques to analyze and verify legal privacy policies
-
Washington, DC, USA, IEEE Computer Society
-
M. J. May, C. A. Gunter, and I. Lee. Privacy APIs: Access control techniques to analyze and verify legal privacy policies. In CSFW '06: Proceedings of the 19th IEEE workshop on Computer Security Foundations, pages 85-97, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
CSFW '06: Proceedings of the 19th IEEE Workshop on Computer Security Foundations
, pp. 85-97
-
-
May, M.J.1
Gunter, C.A.2
Lee, I.3
-
18
-
-
0022334918
-
Ensuring integrity by adding obligations to privileges
-
Los Alamitos, CA, USA, IEEE Computer Society Press
-
N. H. Minsky and A. D. Lockman. Ensuring integrity by adding obligations to privileges. In ICSE '85: Proceedings of the 8th international conference on Software engineering, pages 92-102, Los Alamitos, CA, USA, 1985. IEEE Computer Society Press.
-
(1985)
ICSE '85: Proceedings of the 8th International Conference on Software Engineering
, pp. 92-102
-
-
Minsky, N.H.1
Lockman, A.D.2
-
19
-
-
57349158498
-
An obligation model bridging access control policies and privacy policies
-
New York, NY, USA, ACM
-
Q. Ni, E. Bertino, and J. Lobo. An obligation model bridging access control policies and privacy policies. In SACMAT 2008: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 133-142, New York, NY, USA, 2008. ACM.
-
(2008)
SACMAT 2008: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 133-142
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
21
-
-
34548016110
-
Privacy-aware role based access control
-
New York, NY, USA, ACM
-
Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacy-aware role based access control. In SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, pages 41-50, New York, NY, USA, 2007. ACM.
-
(2007)
SACMAT '07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 41-50
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
22
-
-
0030086382
-
Role-based access control models
-
R, Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
23
-
-
0001549660
-
The ARBAC97 model for role-based aministration of roles
-
Feb.
-
R. S. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based aministration of roles. ACM Transactions on Information and Systems Security, 2(1):105-135, Feb. 1999.
-
(1999)
ACM Transactions on Information and Systems Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
24
-
-
33947695249
-
-
volume 0, Los Alamitos, CA, USA, IEEE Computer Society
-
A. Sasturkar, A. Yang, S. D. Stoller, and C. Ramakrishnan. Policy analysis for administrative role based access control, volume 0, pages 124-138, Los Alamitos, CA, USA, 2006. IEEE Computer Society.
-
(2006)
Policy Analysis for Administrative Role Based Access Control
, pp. 124-138
-
-
Sasturkar, A.1
Yang, A.2
Stoller, S.D.3
Ramakrishnan, C.4
-
25
-
-
84988623695
-
A data sharing agreement framework
-
V. Swarup, L. Seligman, and A. Rosenthal. A data sharing agreement framework. In Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pages 22-36, 2006.
-
(2006)
Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings
, pp. 22-36
-
-
Swarup, V.1
Seligman, L.2
Rosenthal, A.3
-
26
-
-
37149051976
-
Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfhction, and enforcement
-
Washington, DC, USA, IEEE Computer Society
-
A. Uszok, J. Bradshaw, R. Jeffers, N. Suri, P. Hayes, M. Breedy, L. Bunch, M. Johnson, S. Kulkarni, and J. Lott. Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfhction, and enforcement. In POLICY '03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, page 93, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
POLICY '03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 93
-
-
Uszok, A.1
Bradshaw, J.2
Jeffers, R.3
Suri, N.4
Hayes, P.5
Breedy, M.6
Bunch, L.7
Johnson, M.8
Kulkarni, S.9
Lott, J.10
|