-
2
-
-
11244302711
-
Unification in privacy policy evaluation - Translating epal into prolog
-
0
-
M. Backes, M. Durmuth, and G. Karjoth. Unification in privacy policy evaluation - translating epal into prolog. Policies for Distributed Systems and Networks, IEEE International Workshop on, 0:185, 2004.
-
(2004)
Policies for Distributed Systems and Networks, IEEE International Workshop on
, pp. 185
-
-
Backes, M.1
Durmuth, M.2
Karjoth, G.3
-
3
-
-
35048898814
-
Privacy and utility in business processes
-
Washington, DC, USA, IEEE Computer Society
-
A. Barth, J. Mitchell, A. Datta, and S. Sundaram. Privacy and utility in business processes. In CSF '07: Proceedings of the 20th IEEE Computer Security Foundations Symposium, pages 279-294, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
CSF '07: Proceedings of the 20th IEEE Computer Security Foundations Symposium
, pp. 279-294
-
-
Barth, A.1
Mitchell, J.2
Datta, A.3
Sundaram, S.4
-
4
-
-
84949223915
-
A component-based architecture for secure data publication
-
Washington, DC, USA, IEEE Computer Society
-
P. Bonatti, E. Damiani, S. de Capitani, and P. Samarati. A component-based architecture for secure data publication. In ACSAC '01: Proceedings of the 17th Annual Computer Security Applications Conference, page 309, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
ACSAC '01: Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 309
-
-
Bonatti, P.1
Damiani, E.2
De Capitani, S.3
Samarati, P.4
-
5
-
-
34250753855
-
Intentional access management: Making access control usable for end-users
-
New York, NY, USA, ACM
-
X. Cao and L. Iverson. Intentional access management: making access control usable for end-users. In SOUPS '06: Proceedings of the second symposium on Usable privacy and security, pages 20-31, New York, NY, USA, 2006. ACM.
-
(2006)
SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 20-31
-
-
Cao, X.1
Iverson, L.2
-
7
-
-
33748072443
-
The secondary and approximate authorization model and its application to bell-lapadula policies
-
New York, NY, USA, ACM
-
J. Crampton, W. Leung, and K. Beznosov. The secondary and approximate authorization model and its application to bell-lapadula policies. In SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 111-120, New York, NY, USA, 2006. ACM.
-
(2006)
SACMAT '06: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
, pp. 111-120
-
-
Crampton, J.1
Leung, W.2
Beznosov, K.3
-
10
-
-
51849103380
-
Using dependency tracking to provide explanations for policy management
-
Washington, DC, USA, IEEE Computer Society
-
L. Kagal, C. Hanson, and D. Weitzner. Using dependency tracking to provide explanations for policy management. In POLICY '08: Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks, pages 54-61, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
POLICY '08: Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks
, pp. 54-61
-
-
Kagal, L.1
Hanson, C.2
Weitzner, D.3
-
13
-
-
57349199277
-
Xengine: A fast and scalable xacml policy evaluation engine
-
New York, NY, USA, ACM
-
A. X. Liu, F. Chen, J. Hwang, and T. Xie. Xengine: a fast and scalable xacml policy evaluation engine. In SIGMETRICS '08: Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pages 265-276, New York, NY, USA, 2008. ACM.
-
(2008)
SIGMETRICS '08: Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems
, pp. 265-276
-
-
Liu, A.X.1
Chen, F.2
Hwang, J.3
Xie, T.4
-
14
-
-
3543052334
-
First experiences using xacml for access control in distributed systems
-
ACM Press
-
M. Lorch, D. Kafura, S. Proctor, and R. Lepro. First experiences using xacml for access control in distributed systems. In in Proceedings of the 2003 ACM workshop on XML security, pages 25-37. ACM Press, 2003.
-
(2003)
Proceedings of the 2003 ACM Workshop on XML Security
, pp. 25-37
-
-
Lorch, M.1
Kafura, D.2
Proctor, S.3
Lepro, R.4
-
15
-
-
41849148129
-
An xacml-based policy management and authorization service for globus resources
-
Washington, DC, USA, IEEE Computer Society
-
M. Lorch, D. Kafura, and S. Shah. An xacml-based policy management and authorization service for globus resources. In GRID '03: Proceedings of the 4th International Workshop on Grid Computing, page 208, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
GRID '03: Proceedings of the 4th International Workshop on Grid Computing
, pp. 208
-
-
Lorch, M.1
Kafura, D.2
Shah, S.3
-
16
-
-
0347720836
-
An adaptive policy-based framework for network services management
-
September
-
L. Lymberopoulos, E. Lupu, and M. Sloman. An adaptive policy-based framework for network services management. J. Netw. Syst. Manage., 11:277-303, September 2003.
-
(2003)
J. Netw. Syst. Manage.
, vol.11
, pp. 277-303
-
-
Lymberopoulos, L.1
Lupu, E.2
Sloman, M.3
-
20
-
-
33745798209
-
An overview of the swi-prolog programming environment
-
J. Wielemaker. An overview of the swi-prolog programming environment. In WLPE, pages 1-16, 2003.
-
(2003)
WLPE
, pp. 1-16
-
-
Wielemaker, J.1
-
21
-
-
38149139426
-
Deriving xacml policies from business process models
-
Berlin, Heidelberg, Springer-Verlag
-
C. Wolter, A. Schaad, and C. Meinel. Deriving xacml policies from business process models. In WISE'07: Proceedings of the 2007 international conference on Web information systems engineering, pages 142-153, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
WISE'07: Proceedings of the 2007 International Conference on Web Information Systems Engineering
, pp. 142-153
-
-
Wolter, C.1
Schaad, A.2
Meinel, C.3
-
22
-
-
84926001904
-
User-centered security
-
New York, NY, USA, ACM
-
M. E. Zurko and R. T. Simon. User-centered security. In NSPW '96: Proceedings of the 1996 workshop on New security paradigms, pages 27-33, New York, NY, USA, 1996. ACM.
-
(1996)
NSPW '96: Proceedings of the 1996 Workshop on New Security Paradigms
, pp. 27-33
-
-
Zurko, M.E.1
Simon, R.T.2
|