메뉴 건너뛰기




Volumn 6166 LNCS, Issue , 2010, Pages 17-32

A logic of privacy

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODELS; CONCEPTUAL MODEL; CONTROL CONCEPT; DATA SUBJECTS; FORMAL FOUNDATION; META MODEL; PERSONAL DATA; PRIVACY POLICIES; PRIVATE INFORMATION;

EID: 77958494457     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13739-6_2     Document Type: Conference Paper
Times cited : (2)

References (23)
  • 3
    • 11144322222 scopus 로고    scopus 로고
    • The PING personally controlled electronic medical record system: Technical architecture
    • Simons, W., Mandl, K., Kohane, I.: The PING personally controlled electronic medical record system: Technical architecture. Journal of the American Medical Informatics Association 12(1), 45-54 (2005)
    • (2005) Journal of the American Medical Informatics Association , vol.12 , Issue.1 , pp. 45-54
    • Simons, W.1    Mandl, K.2    Kohane, I.3
  • 4
    • 3042822164 scopus 로고    scopus 로고
    • P3p: Making privacy policies more useful
    • Cranor, L. F.: P3p: Making privacy policies more useful. IEEE Security & Privacy 1(6), 50-55 (2003)
    • (2003) IEEE Security & Privacy , vol.1 , Issue.6 , pp. 50-55
    • Cranor, L.F.1
  • 5
    • 11244302711 scopus 로고    scopus 로고
    • Unification in privacy policy evaluation - Translating EPAL into Prolog
    • Backes, M., Dürmuth, M., Karjoth, G.: Unification in privacy policy evaluation - translating EPAL into Prolog. In: POLICY, pp. 185-188 (2004)
    • (2004) POLICY , pp. 185-188
    • Backes, M.1    Dürmuth, M.2    Karjoth, G.3
  • 7
    • 77954321643 scopus 로고    scopus 로고
    • A comparison of two privacy policy languages: EPAL and XACMl
    • Anderson, A. H.: A comparison of two privacy policy languages: EPAL and XACMl. In: SWS, pp. 53-60 (2006)
    • (2006) SWS , pp. 53-60
    • Anderson, A.H.1
  • 8
    • 34548016110 scopus 로고    scopus 로고
    • Privacy-aware role based access control
    • Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privacy-aware role based access control. In: SACMAT, pp. 41-50 (2007)
    • (2007) SACMAT , pp. 41-50
    • Ni, Q.1    Trombetta, A.2    Bertino, E.3    Lobo, J.4
  • 11
    • 0004295027 scopus 로고    scopus 로고
    • Oxford University Press, Oxford
    • Gabbay, D. M.: Fibring logics. Oxford University Press, Oxford (1999)
    • (1999) Fibring Logics
    • Gabbay, D.M.1
  • 12
    • 70450250101 scopus 로고    scopus 로고
    • The next 700 access control models or a unifying meta-model?
    • Barker, S.: The next 700 access control models or a unifying meta-model? In: SACMAT, pp. 187-196 (2009)
    • (2009) SACMAT , pp. 187-196
    • Barker, S.1
  • 13
    • 70349485044 scopus 로고    scopus 로고
    • A meta-model of access control in a fibred security language
    • Barker, S., Boella, G., Gabbay, D. M., Genovese, V.: A meta-model of access control in a fibred security language. Studia Logica 92(3), 437-477 (2009)
    • (2009) Studia Logica , vol.92 , Issue.3 , pp. 437-477
    • Barker, S.1    Boella, G.2    Gabbay, D.M.3    Genovese, V.4
  • 14
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • Lampson, B. W., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10(4), 265-310 (1992)
    • (1992) ACM Trans. Comput. Syst. , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.W.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 15
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • Li, N., Grosof, B. N., Feigenbaum, J.: Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6(1), 128-171 (2003)
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 16
    • 84928602048 scopus 로고    scopus 로고
    • FSL - Fibred security language
    • Boella, G., Noriega, P., Pigozzi, G., Verhagen, H. eds., Dagstuhl, Germany, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany
    • Genovese, V., Gabbay, D. M., Boella, G., van der Torre, L.: FSL - fibred security language. In: Boella, G., Noriega, P., Pigozzi, G., Verhagen, H. (eds.) Normative Multi-Agent Systems. Number 09121 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany (2009)
    • (2009) Normative Multi-Agent Systems. Number 09121 in Dagstuhl Seminar Proceedings
    • Genovese, V.1    Gabbay, D.M.2    Boella, G.3    Van Der Torre, L.4
  • 22
    • 0001619596 scopus 로고    scopus 로고
    • Flexible support for multiple access control policies
    • Jajodia, S., Samarati, P., Sapino, M., Subrahmaninan, V.: Flexible support for multiple access control policies. ACM TODS 26(2), 214-260 (2001)
    • (2001) ACM TODS , vol.26 , Issue.2 , pp. 214-260
    • Jajodia, S.1    Samarati, P.2    Sapino, M.3    Subrahmaninan, V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.