-
1
-
-
2442512413
-
Extensible access control markup language (XACML) version 2.0
-
Extensible access control markup language (XACML) version 2.0. OASIS Standard, 2005.
-
(2005)
OASIS Standard
-
-
-
2
-
-
27644576852
-
Policy ratification
-
D. Agrawal, J. Giles, K. W. Lee, and J. Lobo. Policy ratification. In Proc. of the IEEE International Workshop on Policies for Distributed Systems and Networks, pages 223-232, 2005.
-
(2005)
Proc. of the IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 223-232
-
-
Agrawal, D.1
Giles, J.2
Lee, K.W.3
Lobo, J.4
-
4
-
-
74049102823
-
Provable data possession at untrusted stores
-
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. Provable data possession at untrusted stores. In Proc. of ACM conference on Computer and communications security, pages 598-609, 2007.
-
(2007)
Proc. of ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
6
-
-
35048879817
-
An algebra for composing enterprise privacy policies
-
M. Backes, M. Duermuth, and R. Steinwandt. An algebra for composing enterprise privacy policies. In Proc. of European Symposium on Research in Computer Security, volume 3193, pages 33-52, 2004.
-
(2004)
Proc. of European Symposium on Research in Computer Security
, vol.3193
, pp. 33-52
-
-
Backes, M.1
Duermuth, M.2
Steinwandt, R.3
-
7
-
-
2442516401
-
Efficient comparison of enterprise privacy policies
-
M. Backes, G. Karjoth, W. Bagga, and M. Schunter. Efficient comparison of enterprise privacy policies. In Proc. of ACM Symposium on Applied Computing, pages 375-382, 2004.
-
(2004)
Proc. of ACM Symposium on Applied Computing
, pp. 375-382
-
-
Backes, M.1
Karjoth, G.2
Bagga, W.3
Schunter, M.4
-
8
-
-
85025424440
-
An algebra for composing access control policies
-
P. Bonatti, S. D. C. D. Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Transactions on Information and System Security, 5(1):1-35, 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
Vimercati, S.D.C.D.2
Samarati, P.3
-
10
-
-
73549093886
-
-
Identity in the Information Society
-
A. Cavoukian. Privacy in the clouds. Identity in the Information Society, 1, 2008.
-
(2008)
Privacy in the Clouds
, pp. 1
-
-
Cavoukian, A.1
-
13
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz. Verification and change-impact analysis of access-control policies. In Proc. of the International Conference on Software Engineering, pages 196-205, 2005.
-
(2005)
Proc. of the International Conference on Software Engineering
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
14
-
-
0031120522
-
Multi-terminal binary decision diagrams: An efficient datastructure for matrix representation
-
M. Fujita, P. C. McGeer, and J. C.-Y. Yang. Multi-terminal binary decision diagrams: An efficient datastructure for matrix representation. Formal Methods in System Design, 10(2-3):149-169, 1997.
-
(1997)
Formal Methods in System Design
, vol.10
, Issue.2-3
, pp. 149-169
-
-
Fujita, M.1
McGeer, P.C.2
Yang, J.C.-Y.3
-
15
-
-
77954931916
-
Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
-
R. Gellman. Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. World Privacy Forum, 2009.
-
(2009)
World Privacy Forum
-
-
Gellman, R.1
-
17
-
-
33746064509
-
Timed constraint programming: A declarative approach to usage control
-
R. Jagadeesan, W. Marrero, C. Pitcher, and V. Saraswat. Timed constraint programming: a declarative approach to usage control. In Proc. of the ACM SIGPLAN international conference on Principles and practice of declarative programming, pages 164-175, 2005.
-
(2005)
Proc. of the ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming
, pp. 164-175
-
-
Jagadeesan, R.1
Marrero, W.2
Pitcher, C.3
Saraswat, V.4
-
19
-
-
70349309706
-
Data security in the world of cloud computing
-
L. M. Kaufman. Data security in the World of Cloud Computing. IEEE Security and Privacy, 7(4):61-64, 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.M.1
-
20
-
-
85077532807
-
A cooperative internet backup scheme
-
General Track
-
M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard. A cooperative internet backup scheme. In USENIX Annual Technical Conference, General Track, pages 29-41, 2003.
-
(2003)
USENIX Annual Technical Conference
, pp. 29-41
-
-
Lillibridge, M.1
Elnikety, S.2
Birrell, A.3
Burrows, M.4
Isard, M.5
-
21
-
-
34548023083
-
An approach to evaluate policy similarity
-
D. Lin, P. Rao, E. Bertino, N. Li, and J. Lobo. An approach to evaluate policy similarity. In Proc. of ACM Symposium on Access Control Models and Technologies, pages 1-10, 2007.
-
(2007)
Proc. of ACM Symposium on Access Control Models and Technologies
, pp. 1-10
-
-
Lin, D.1
Rao, P.2
Bertino, E.3
Li, N.4
Lobo, J.5
-
22
-
-
0033333334
-
Conflicts in policy-based distributed systems management
-
E. Lupu and M. Sloman. Conflicts in policy-based distributed systems management. IEEE Transactions on Software Engineering, 25(6):852-869, 1999.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.1
Sloman, M.2
-
26
-
-
77954914530
-
Cloud computing: Clash of the clouds
-
Cloud Computing: Clash of the clouds. The economist. 2009.
-
(2009)
The Economist
-
-
-
29
-
-
71749102261
-
A privacy manager for cloud computing
-
Siani Pearson, Yun Shen, and Miranda Mowbray. A privacy manager for cloud computing. In CloudCom, pages 90-106, 2009.
-
(2009)
CloudCom
, pp. 90-106
-
-
Pearson, S.1
Shen, Y.2
Mowbray, M.3
-
30
-
-
77954903489
-
-
Proofpoint. http://www.proofpoint.com/.
-
Proofpoint
-
-
-
31
-
-
70450247027
-
An algebra for fine-grained integration of xacml policies
-
P. Rao, D. Lin, E. Bertino, N. Li, and J. Lobo. An algebra for fine-grained integration of xacml policies. In Proc. of ACM Symposium on Access Control Models and Technologies, pages 63-72, 2009.
-
(2009)
Proc. of ACM Symposium on Access Control Models and Technologies
, pp. 63-72
-
-
Rao, P.1
Lin, D.2
Bertino, E.3
Li, N.4
Lobo, J.5
-
32
-
-
77954913878
-
A similarity measure for comparing access control policies
-
Purdue University, USA
-
P. Rao, D. Lin, R. Ferrini, E. Bertino, and J. Lobo. A similarity measure for comparing access control policies. In Technical Report, Dept of Computer Science, Purdue University, USA, 2010.
-
(2010)
Technical Report, Dept of Computer Science
-
-
Rao, P.1
Lin, D.2
Ferrini, R.3
Bertino, E.4
Lobo, J.5
-
33
-
-
73549113094
-
A taxonomy and survey of Cloud Computing systems
-
0
-
B. P. Rimal, E. Choi, and I. Lumb. A taxonomy and survey of Cloud Computing systems. Networked Computing and Advanced Information Management, International Conference on, 0:44-51, 2009.
-
(2009)
Networked Computing and Advanced Information Management, International Conference on
, pp. 44-51
-
-
Rimal, B.P.1
Choi, E.2
Lumb, I.3
-
34
-
-
84876306509
-
-
Salesforce. http://www.salesforce.com/.
-
Salesforce
-
-
-
36
-
-
33947694320
-
Store, forget, and check: Using algebraic signatures to check remotely administered storage
-
Thomas J. E. Schwarz and Ethan L. Miller. Store, forget, and check: Using algebraic signatures to check remotely administered storage. In IEEE ICDCS, International Conference on Distributed Systems, page 12, 2006.
-
(2006)
IEEE ICDCS, International Conference on Distributed Systems
, pp. 12
-
-
Schwarz, T.J.E.1
Miller, E.L.2
-
39
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS, pages 355-370, 2009.
-
(2009)
ESORICS
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
40
-
-
77954901456
-
-
Workday. http://www.workday.com/.
-
Workday
-
-
|