-
2
-
-
20444460387
-
Conflict and combination in privacy policy languages
-
ACM, New York
-
BARTH, A., MITCHELL, J. C., AND ROSENSTEIN, J. 2004. Conflict and combination in privacy policy languages. In Proceedings of the Workshop on Privacy in the Electronic Society. ACM, New York, 45-46.
-
(2004)
Proceedings of the Workshop on Privacy in the Electronic Society
, pp. 45-46
-
-
Barth, A.1
Mitchell, J.C.2
Rosenstein, J.3
-
3
-
-
45749089618
-
Purpose-based access control for privacy protection in relational database systems
-
BYUN, J.-W. AND LI, N. 2008. Purpose-based access control for privacy protection in relational database systems. VLDB J. 17, 4, 603-619.
-
(2008)
VLDB J.
, vol.17
, Issue.4
, pp. 603-619
-
-
Byun, J.-W.1
Li, N.2
-
5
-
-
84992227458
-
Proposed standard for role-based access control
-
FERRAIOLO, D. F., SANDHU, R., GAVRILA, S., KUHN, D. R., AND CHANDRAMOULI, R. 2001. Proposed standard for role-based access control. ACM Trans. Inform. Syst. Secur. 4, 3, 224-274.
-
(2001)
ACM Trans. Inform. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
8
-
-
33745812093
-
Evaluating interfaces for privacy policy rule authoring
-
ACM, New York
-
KARAT, C.-M., KARAT, J., BRODIE, C., AND FENG, J. 2006. Evaluating interfaces for privacy policy rule authoring. In Proceedings of the Conference on Human Factors in Computing Systems. ACM, New York, 83-92.
-
(2006)
Proceedings of the Conference on Human Factors in Computing Systems
, pp. 83-92
-
-
Karat, C.-M.1
Karat, J.2
Brodie, C.3
Feng, J.4
-
9
-
-
33645970213
-
Designing natural language and structured entry methods for privacy policy authoring
-
Springer-Verlag, Berlin
-
KARAT, J., KARAT, C.-M., BRODIE, C., AND FENG, J. 2005a. Designing natural language and structured entry methods for privacy policy authoring. In Proceedings of the International Conference on Human-Computer Interaction. Springer-Verlag, Berlin, 671-684.
-
(2005)
Proceedings of the International Conference on Human-Computer Interaction
, pp. 671-684
-
-
Karat, J.1
Karat, C.-M.2
Brodie, C.3
Feng, J.4
-
10
-
-
19944382845
-
Privacy in information technology: Designing to enable privacy policy management in organizations
-
KARAT, J., KARAT, C.-M., BRODIE, C., AND FENG, J. 2005b. Privacy in information technology: Designing to enable privacy policy management in organizations. Int. J. Hum.-Comput. Stud. 63, 1-2, 153-174.
-
(2005)
Int. J. Hum.-Comput. Stud.
, vol.63
, Issue.1-2
, pp. 153-174
-
-
Karat, J.1
Karat, C.-M.2
Brodie, C.3
Feng, J.4
-
11
-
-
84948735377
-
A privacy policy model for enterprises
-
IEEE, Los Alamitos, CA
-
KARJOTH, G. AND SCHUNTER, M. 2002. A privacy policy model for enterprises. In Proceedings of the 15th Computer Security Foundations Workshop. IEEE, Los Alamitos, CA, 271-281.
-
(2002)
Proceedings of the 15th Computer Security Foundations Workshop
, pp. 271-281
-
-
Karjoth, G.1
Schunter, M.2
-
12
-
-
0003269223
-
Health insurance portability and accountability act of 1996
-
LAW, U. S. F. 1996. Health insurance portability and accountability act of 1996. Pub. L. 104-191.
-
(1996)
Pub. L.
, pp. 104-191
-
-
Law, U.S.F.1
-
13
-
-
57349158498
-
An obligation model bridging access control policies and privacy policies
-
ACM, New York
-
NI, Q., BERTINO, E., AND LOBO, J. 2008. An obligation model bridging access control policies and privacy policies. In Proceedings of the Symposium on Access Control Methods and Technologies. ACM, New York, 133-142.
-
(2008)
Proceedings of the Symposium on Access Control Methods and Technologies
, pp. 133-142
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
14
-
-
77955209318
-
Privacyaware role-based access control
-
CERIAS, Purdue University
-
NI, Q., BERTINO, E., LOBO, J., BRODIE, C.,KARAT, C.-M., KARAT, J., AND TROMBETTA, A. 2009. Privacyaware role-based access control. Tech. rep., CERIAS, Purdue University.
-
(2009)
Tech. rep.
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
Brodie C.Karat, C.-M.4
Karat, J.5
Trombetta, A.6
-
15
-
-
38049002527
-
Conditional privacy-aware role-based access control
-
Springer- Verlag, Berlin
-
NI, Q., LIN, D., BERTINO, E., AND LOBO, J. 2007. Conditional privacy-aware role-based access control. In Proceedings of the European Symposium on Research in Computer Security. Springer- Verlag, Berlin, 72-89.
-
(2007)
Proceedings of the European Symposium on Research in Computer Security
, pp. 72-89
-
-
Ni, Q.1
Lin, D.2
Bertino, E.3
Lobo, J.4
-
19
-
-
84874834655
-
Privacy promises, access control, and privacy management
-
IEEE, Los Alamitos, CA
-
POWERS, C. S. 2002. Privacy promises, access control, and privacy management. In Proceedings of the 3rd International Symposium on Electronic Commerce. IEEE, Los Alamitos, CA, 13.
-
(2002)
Proceedings of the 3rd International Symposium on Electronic Commerce
, pp. 13
-
-
Powers, C.S.1
-
20
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Computer 29, 2, 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
21
-
-
33845246527
-
A policy-based management framework for pervasive systems using axiomatized rule-actions
-
IEEE, Los Alamitos, CA
-
SHANKAR, C. AND CAMPBELL, R. 2005. A policy-based management framework for pervasive systems using axiomatized rule-actions. In Proceedings of the 4th International Symposium on Network Computing and Applications. IEEE, Los Alamitos, CA, 255-258.
-
(2005)
Proceedings of the 4th International Symposium on Network Computing and Applications
, pp. 255-258
-
-
Shankar, C.1
Campbell, R.2
|