-
1
-
-
77954893367
-
-
Bank Secrecy Act of 1970, 1970. 31 USC 5311-5332 and 31 CFR 103
-
Bank Secrecy Act of 1970, 1970. 31 USC 5311-5332 and 31 CFR 103.
-
-
-
-
2
-
-
0004243736
-
-
The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
-
The Health Insurance Portability and Accountability Act of 1996 (HIPAA), 1996. Public Law 104-191.
-
(1996)
Public Law
, pp. 104-191
-
-
-
3
-
-
22144443678
-
-
USA Patriot Act of 2001, HR 3162 RDS
-
USA Patriot Act of 2001, 2001. Public Law 107-56, HR 3162 RDS.
-
(2001)
Public Law 107-56
-
-
-
7
-
-
84944202148
-
Rule-based runtime verification
-
volume 2937 of Lect. Notes Comput. Sci
-
H. Barringer, A. Goldberg, K. Havelund, and K. Sen. Rule-based runtime verification. In Proceedings of the 5th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'04), volume 2937 of Lect. Notes Comput. Sci., pages 44-57, 2004.
-
(2004)
Proceedings of the 5th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'04)
, pp. 44-57
-
-
Barringer, H.1
Goldberg, A.2
Havelund, K.3
Sen, K.4
-
8
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum. Privacy and contextual integrity: Framework and applications. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 184-198, 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
9
-
-
84880195884
-
Runtime monitoring of metric first-order temporal properties
-
Dagstuhl Seminar Proceedings
-
D. Basin, F. Klaedtke, S. Muller, and B. Pfitzmann. Runtime monitoring of metric first-order temporal properties. In Proceedings of the 28th International Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'08), Dagstuhl Seminar Proceedings, pages 49-60, 2008.
-
(2008)
Proceedings of the 28th International Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'08)
, pp. 49-60
-
-
Basin, D.1
Klaedtke, F.2
Muller, S.3
Pfitzmann, B.4
-
11
-
-
0032153903
-
An access control model supportting periodicity and temporal reasoning
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supportting periodicity and temporal reasoning. ACM Trans. Database Syst., 23(3):231-285, 1998.
-
(1998)
ACM Trans. Database Syst.
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
12
-
-
0345829056
-
Provisions and obligations in policy rule management
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy rule management. J. Netw. Syst. Manage., 11(3):351-372, 2003.
-
(2003)
J. Netw. Syst. Manage.
, vol.11
, Issue.3
, pp. 351-372
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
14
-
-
84976843391
-
Efficient checking of temporal integrity constraints using bounded history encoding
-
J. Chomicki. Efficient checking of temporal integrity constraints using bounded history encoding. ACM Trans. Database Syst., 20(2):149-186, 1995.
-
(1995)
ACM Trans. Database Syst.
, vol.20
, Issue.2
, pp. 149-186
-
-
Chomicki, J.1
-
15
-
-
38149030121
-
LOLA: Runtime monitoring of synchronous systems
-
B. D'Angelo, S. Sankaranarayanan, C. Sánchez, W. Robinson, B. Finkbeiner, H. B. Sipma, S. Mehrotra, and Z. Manna. LOLA: Runtime monitoring of synchronous systems. In Proceedings of the 12th International Symposium on Temporal Representation and Reasoning (TIME'05), pages 166-174, 2005.
-
(2005)
Proceedings of the 12th International Symposium on Temporal Representation and Reasoning (TIME'05)
, pp. 166-174
-
-
D'Angelo, B.1
Sankaranarayanan, S.2
Sánchez, C.3
Robinson, W.4
Finkbeiner, B.5
Sipma, H.B.6
Mehrotra, S.7
Manna, Z.8
-
16
-
-
57049105761
-
Checking traces for regulatory conformance
-
volume 5289 of Lect. Notes Comput. Sci.
-
N. Dinesh, A. Joshi, I. Lee, and O. Sokolsky. Checking traces for regulatory conformance. In Proceedings of the 8th Workshop on Runtime Verification (RV'08), volume 5289 of Lect. Notes Comput. Sci., pages 86-103, 2008.
-
(2008)
Proceedings of the 8th Workshop on Runtime Verification (RV'08)
, pp. 86-103
-
-
Dinesh, N.1
Joshi, A.2
Lee, I.3
Sokolsky, O.4
-
17
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Trans. Inform. Syst. Secur., 4(3):224-274, 2001.
-
(2001)
ACM Trans. Inform. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.I.3
Kuhn, D.R.4
Chandramouli, R.5
-
18
-
-
84944105044
-
Regulations expressed as logical models (REALM)
-
volume 134 of Frontiers Artificial Intelligence Appl
-
C. Giblin, A. Y. Liu, S. Müller, B. Pfitzmann, and X. Zhou. Regulations expressed as logical models (REALM). In Proceedings of the 18th Annual Conference on Legal Knowledge and Information Systems (JURIX'05), volume 134 of Frontiers Artificial Intelligence Appl., pages 37-48, 2005.
-
(2005)
Proceedings of the 18th Annual Conference on Legal Knowledge and Information Systems (JURIX'05)
, pp. 37-48
-
-
Giblin, C.1
Liu, A.Y.2
Müller, S.3
Pfitzmann, B.4
Zhou, X.5
-
23
-
-
34748838372
-
Deriving enforcement mechanisms from polices
-
H. Janicke, A. Cau, F. Siewe, and H. Zedan. Deriving enforcement mechanisms from polices. In Proceedings of the 8th IEEE International Workshop for Policies for Distributed Systems and Networks (POLICY'07), pages 161-172, 2007.
-
(2007)
Proceedings of the 8th IEEE International Workshop for Policies for Distributed Systems and Networks (POLICY'07)
, pp. 161-172
-
-
Janicke, H.1
Cau, A.2
Siewe, F.3
Zedan, H.4
-
25
-
-
0001601021
-
Specifying real-time properties with metric temporal logic
-
R. Koymans. Specifying real-time properties with metric temporal logic. Real-Time Systems, 2(4):255-299, 1990.
-
(1990)
Real-Time Systems
, vol.2
, Issue.4
, pp. 255-299
-
-
Koymans, R.1
-
27
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
J. Ligatti, L. Bauer, and D. Walker. Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur., 4(1-2):2-16, 2005.
-
(2005)
Int. J. Inf. Secur.
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
36
-
-
33646578742
-
Run-time checking of dynamic properties
-
O. Sokolsky, U. Sammapun, I. Lee, and J. Kim. Run-time checking of dynamic properties. Elec. Notes Theo. Comput. Sci., 144(4):91-108, 2006.
-
(2006)
Elec. Notes Theo. Comput. Sci.
, vol.144
, Issue.4
, pp. 91-108
-
-
Sokolsky, O.1
Sammapun, U.2
Lee, I.3
Kim, J.4
-
37
-
-
11344251138
-
Monitoring algorithms for metric temporal logic specifications
-
P. Thati and G. Rosu. Monitoring algorithms for metric temporal logic specifications. Elec. Notes Theo. Comput. Sci., 113:145-162, 2005.
-
(2005)
Elec. Notes Theo. Comput. Sci.
, vol.113
, pp. 145-162
-
-
Thati, P.1
Rosu, G.2
-
38
-
-
33745450500
-
Formal model and policy specification of usage control
-
X. Zhang, F. Parisi-Presicce, R. Sandhu, and J. Park. Formal model and policy specification of usage control. ACM Trans. Inform. Syst. Secur., 8(4):351-387, 2005.
-
(2005)
ACM Trans. Inform. Syst. Secur.
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.3
Park, J.4
|