-
1
-
-
48249091293
-
A privacy-aware access control system
-
C. A. Ardagna, M. Cremonini, S. D. C. di Vimercati, and P. Samarati. A privacy-aware access control system. Journal of Computer Security, 16(4):369-397, 2008.
-
(2008)
Journal of Computer Security
, vol.16
, Issue.4
, pp. 369-397
-
-
Ardagna, C.A.1
Cremonini, M.2
Di Vimercati, S.D.C.3
Samarati, P.4
-
2
-
-
71049146407
-
Policy-Based real-time decision-making for personalized service delivery
-
July
-
J. Bauknecht, J. Haussler, D. Kraft, M. Kuhnen, M. Lischka, and A. Schulke. Policy-Based Real-Time Decision-Making for Personalized Service Delivery. In IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pages 53-59, July 2009.
-
(2009)
IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY)
, pp. 53-59
-
-
Bauknecht, J.1
Haussler, J.2
Kraft, D.3
Kuhnen, M.4
Lischka, M.5
Schulke, A.6
-
3
-
-
84893077785
-
Obligation monitoring in policy management
-
Los Alamitos, CA, USA, IEEE Computer Society.
-
C. Bettini, X. Wang, S. Jajodia, and D. Wijesekera. Obligation monitoring in policy management. In IEEE International Workshop on Policies for Distributed Systems and Networks,, pages 2-12, Los Alamitos, CA, USA, 2002. IEEE Computer Society.
-
(2002)
IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 2-12
-
-
Bettini, C.1
Wang, X.2
Jajodia, S.3
Wijesekera, D.4
-
5
-
-
84944048132
-
The ponder policy specification language
-
In M. Sloman, J. Lobo, and E. Lupu, editors, Springer
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The ponder policy specification language. In M. Sloman, J. Lobo, and E. Lupu, editors, POLICY, volume 1995 of Lecture Notes in Computer Science, pages 18-38. Springer, 2001.
-
(2001)
POLICY, Volume 1995 of Lecture Notes in Computer Science
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
6
-
-
74049156945
-
Deductive policies with XACML
-
Chicago, IL, November 13 ACM.
-
M. Lischka, Y. Endo, and M. Sánchez Cuenca. Deductive Policies with XACML. In Proceedings of the Workshop on Secure Web Services, pages 37-44, Chicago, IL, November 13 2009. ACM.
-
(2009)
Proceedings of the Workshop on Secure Web Services
, pp. 37-44
-
-
Lischka, M.1
Endo, Y.2
Sánchez Cuenca, M.3
-
8
-
-
0022334918
-
Ensuring integrity by adding obligations to privileges
-
London, UK, August 28-30 IEEE Computer Society
-
N. H. Minsky and A. Lockman. Ensuring integrity by adding obligations to privileges. In Proceedings, 8th International Conference on Software Engineering, pages 92-102, London, UK, August 28-30 1985. IEEE Computer Society.
-
(1985)
Proceedings, 8th International Conference on Software Engineering
, pp. 92-102
-
-
Minsky, N.H.1
Lockman, A.2
-
9
-
-
34748883672
-
On parametric obligation policies: Enabling privacy-aware information lifecycle management in enterprises
-
Washington, DC, USA, IEEE Computer Society
-
M. C. Mont and F. Beato. On parametric obligation policies: Enabling privacy-aware information lifecycle management in enterprises. In POLICY '07: Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, pages 51-55, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
POLICY '07: Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 51-55
-
-
Mont, M.C.1
Beato, F.2
-
10
-
-
57349158498
-
An obligation model bridging access control policies and privacy policies
-
New York, NY, USA
-
Q. Ni, E. Bertino, and J. Lobo. An obligation model bridging access control policies and privacy policies. In SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 133-142, New York, NY, USA, 2008. ACM.
-
(2008)
SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 133-142
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
12
-
-
77957767274
-
-
Version 1.0, 28 Dec Working draft 3.
-
OASIS. XACML v3.0 Obligation Families Version 1.0, 28 Dec 2007. Working draft 3.
-
(2007)
XACML V3.0 Obligation Families
-
-
-
14
-
-
51849136554
-
Ponder2 - A policy environment for autonomous pervasive systems
-
June
-
K. Twidle, E. Lupu, N. Dulay, and M. Sloman. Ponder2 - a policy environment for autonomous pervasive systems. In Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE Workshop on, pages 245-246, June 2008.
-
(2008)
Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE Workshop on
, pp. 245-246
-
-
Twidle, K.1
Lupu, E.2
Dulay, N.3
Sloman, M.4
-
15
-
-
22444452420
-
Prohairetic deontic logic (pdl)
-
In J. Dix, L. F. del Cerro, and U. Furbach, editors, Springer, 1998
-
L. W. N. van der Torre and Y-H. Tan. Prohairetic deontic logic (pdl). In J. Dix, L. F. del Cerro, and U. Furbach, editors, Logics in Artificial Intelligence, European Workshop, JELIA '98, Dagstuhl, Germany, October 12-15, 1998, Proceedings, volume 1489 of Lecture Notes in Computer Science, pages 77-91. Springer, 1998.
-
Logics in Artificial Intelligence, European Workshop, JELIA '98, Dagstuhl, Germany, October 12-15, 1998, Proceedings, Volume 1489 of Lecture Notes in Computer Science
, pp. 77-91
-
-
Van Der Torre, L.W.N.1
Tan, Y.-H.2
|