-
3
-
-
11144322222
-
The PING personally controlled electronic medical record system: Technical architecture
-
Simons, W., Mandl, K., Kohane, I.: The PING personally controlled electronic medical record system: Technical architecture. Journal of the American Medical Informatics Association 12(1), 45-54 (2005)
-
(2005)
Journal of the American Medical Informatics Association
, vol.12
, Issue.1
, pp. 45-54
-
-
Simons, W.1
Mandl, K.2
Kohane, I.3
-
4
-
-
3042822164
-
P3p: Making privacy policies more useful
-
Cranor, L. F.: P3p: Making privacy policies more useful. IEEE Security & Privacy 1(6), 50-55 (2003)
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 50-55
-
-
Cranor, L.F.1
-
5
-
-
11244302711
-
Unification in privacy policy evaluation - Translating EPAL into Prolog
-
Backes, M., Dürmuth, M., Karjoth, G.: Unification in privacy policy evaluation - translating EPAL into Prolog. In: POLICY, pp. 185-188 (2004)
-
(2004)
POLICY
, pp. 185-188
-
-
Backes, M.1
Dürmuth, M.2
Karjoth, G.3
-
6
-
-
85102591607
-
Limiting disclosure in hippocratic databases
-
LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D. J.: Limiting disclosure in hippocratic databases. In: VLDB, pp. 108-119 (2004)
-
(2004)
VLDB
, pp. 108-119
-
-
LeFevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.J.6
-
7
-
-
77954321643
-
A comparison of two privacy policy languages: EPAL and XACMl
-
Anderson, A. H.: A comparison of two privacy policy languages: EPAL and XACMl. In: SWS, pp. 53-60 (2006)
-
(2006)
SWS
, pp. 53-60
-
-
Anderson, A.H.1
-
8
-
-
34548016110
-
Privacy-aware role based access control
-
Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privacy-aware role based access control. In: SACMAT, pp. 41-50 (2007)
-
(2007)
SACMAT
, pp. 41-50
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
9
-
-
70349333899
-
Privacy-aware role-based access control
-
Ni, Q., Bertino, E., Lobo, J., Calo, S. B.: Privacy-aware role-based access control. IEEE Security & Privacy 7(4), 35-43 (2009)
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.4
, pp. 35-43
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
Calo, S.B.4
-
10
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
Barth, A., Datta, A., Mitchell, J. C., Nissenbaum, H.: Privacy and contextual integrity: Framework and applications. In: IEEE Symposium on Security and Privacy, pp. 184-198 (2006)
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
11
-
-
0004295027
-
-
Oxford University Press, Oxford
-
Gabbay, D. M.: Fibring logics. Oxford University Press, Oxford (1999)
-
(1999)
Fibring Logics
-
-
Gabbay, D.M.1
-
12
-
-
70450250101
-
The next 700 access control models or a unifying meta-model?
-
Barker, S.: The next 700 access control models or a unifying meta-model? In: SACMAT, pp. 187-196 (2009)
-
(2009)
SACMAT
, pp. 187-196
-
-
Barker, S.1
-
13
-
-
70349485044
-
A meta-model of access control in a fibred security language
-
Barker, S., Boella, G., Gabbay, D. M., Genovese, V.: A meta-model of access control in a fibred security language. Studia Logica 92(3), 437-477 (2009)
-
(2009)
Studia Logica
, vol.92
, Issue.3
, pp. 437-477
-
-
Barker, S.1
Boella, G.2
Gabbay, D.M.3
Genovese, V.4
-
14
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson, B. W., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10(4), 265-310 (1992)
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.W.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
15
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Li, N., Grosof, B. N., Feigenbaum, J.: Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6(1), 128-171 (2003)
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
16
-
-
84928602048
-
FSL - Fibred security language
-
Boella, G., Noriega, P., Pigozzi, G., Verhagen, H. eds., Dagstuhl, Germany, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany
-
Genovese, V., Gabbay, D. M., Boella, G., van der Torre, L.: FSL - fibred security language. In: Boella, G., Noriega, P., Pigozzi, G., Verhagen, H. (eds.) Normative Multi-Agent Systems. Number 09121 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany (2009)
-
(2009)
Normative Multi-Agent Systems. Number 09121 in Dagstuhl Seminar Proceedings
-
-
Genovese, V.1
Gabbay, D.M.2
Boella, G.3
Van Der Torre, L.4
-
17
-
-
0027667638
-
A calculus for access control in distributed systems
-
Abadi, M., Burrows, M., Lampson, B. W., Plotkin, G. D.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst. 15(4), 706-734 (1993)
-
(1993)
ACM Trans. Program. Lang. Syst.
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.W.3
Plotkin, G.D.4
-
19
-
-
13644270728
-
Many-dimensional modal logics: Theory and applications
-
Gabbay, D., Kurucz, A., Wolter, F., Zakharyaschev, M.: Many-Dimensional Modal Logics: Theory and Applications. Elsevier - Studies in Logic (2003)
-
(2003)
Elsevier - Studies in Logic
-
-
Gabbay, D.1
Kurucz, A.2
Wolter, F.3
Zakharyaschev, M.4
-
20
-
-
30644474612
-
Purpose based access control of complex data for privacy protection
-
DOI 10.1145/1063979.1063998, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
-
Byun, J. W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: SACMAT, pp. 102-110 (2005) (Pubitemid 43087467)
-
(2005)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 102-110
-
-
Byun, J.-W.1
Bertino, E.2
Li, N.3
-
21
-
-
56349114982
-
Status-based access control
-
Barker, S., Sergot, M. J., Wijesekera, D.: Status-based access control. ACM Trans. Inf. Syst. Secur. 12 (1) (2008)
-
(2008)
ACM Trans. Inf. Syst. Secur
, vol.12
, Issue.1
-
-
Barker, S.1
Sergot, M.J.2
Wijesekera, D.3
-
22
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia, S., Samarati, P., Sapino, M., Subrahmaninan, V.: Flexible support for multiple access control policies. ACM TODS 26(2), 214-260 (2001)
-
(2001)
ACM TODS
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmaninan, V.4
|