-
1
-
-
2342522578
-
Financial privacy policies and the need for standardization
-
A. I. Antón, J. B. Earp, Q. He, W. H. Stufflebeam, D. Bolchini, and C. Jensen. Financial privacy policies and the need for standardization. IEEE Security & Privacy, 2(2):36-45, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.2
, pp. 36-45
-
-
Antón, A.I.1
Earp, J.B.2
He, Q.3
Stufflebeam, W.H.4
Bolchini, D.5
Jensen, C.6
-
2
-
-
24944578141
-
-
Technical Report RZ 3485 (93951), IBM Tivoli Software, Tivoli
-
P. Ashley, S. Hada, G. Karjoth, and C. P. M. Schunter. Enterprise privacy authorization language. Technical Report RZ 3485 (93951), IBM Tivoli Software, Tivoli, 2003.
-
(2003)
Enterprise Privacy Authorization Language
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Schunter, C.P.M.4
-
3
-
-
0346203703
-
Exception-based information flow control in object-oriented systems
-
E. Bertino, S. D. C. di Vimercati, E. Ferrari, and P. Samarati. Exception-based information flow control in object-oriented systems. ACM Trans. Inf. Syst. Secur., 1(1):26-65, 1998.
-
(1998)
ACM Trans. Inf. Syst. Secur.
, vol.1
, Issue.1
, pp. 26-65
-
-
Bertino, E.1
Di Vimercati, S.D.C.2
Ferrari, E.3
Samarati, P.4
-
4
-
-
84885231743
-
-
Available from February
-
Enterprise Privacy Markup Language. Available from http://www.synomos. com/html/EPML/documents/EPML-1-0-Specification.pdf, February, 2002.
-
(2002)
Enterprise Privacy Markup Language
-
-
-
5
-
-
33745883651
-
-
Available from Feb
-
eXtensible Access Control Markup Language. Available from http://docs.oasis-open.org/xacml/2.0/access-control-xacml-2.0-core-spec-os.pdf, Feb 2005.
-
(2005)
EXtensible Access Control Markup Language
-
-
-
6
-
-
84885232984
-
-
Available from
-
eXtensible Rights Markup Language. Available from http://www.xrml.org.
-
-
-
-
8
-
-
84957805078
-
Platform for enterprise privacy practices: Privacy-enabled management of customer data
-
G. Karjoth, M. Schunter, and M. Waidner. Platform for enterprise privacy practices: Privacy-enabled management of customer data. In Privacy Enhancing Technologies, pages 69-84, 2002.
-
(2002)
Privacy Enhancing Technologies
, pp. 69-84
-
-
Karjoth, G.1
Schunter, M.2
Waidner, M.3
-
9
-
-
84942776290
-
Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
-
M. C. Mont, S. Pearson, and P. Bramhall. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In DEXA Workshops, pages 377-382, 2003.
-
(2003)
DEXA Workshops
, pp. 377-382
-
-
Mont, M.C.1
Pearson, S.2
Bramhall, P.3
-
15
-
-
28144453799
-
Dimensions and principles of declassification
-
A. Sabelfeld and D. Sands. Dimensions and principles of declassification. In CSFW, pages 255-269, 2005.
-
(2005)
CSFW
, pp. 255-269
-
-
Sabelfeld, A.1
Sands, D.2
-
17
-
-
84954090557
-
A formal semantics for p3p
-
New York, NY, USA, ACM Press
-
T. Yu, N. Li, and A. I. Antón. A formal semantics for p3p. In SWS '04: Proceedings of the 2004 workshop on Secure web service, pages 1-8, New York, NY, USA, 2004. ACM Press.
-
(2004)
SWS '04: Proceedings of the 2004 Workshop on Secure Web Service
, pp. 1-8
-
-
Yu, T.1
Li, N.2
Antón, A.I.3
|