-
1
-
-
0028202370
-
A really temporal logic
-
R. Alur and T. A. Henzinger. A really temporal logic. Journal of the ACM, 41(1):181-203, 1994.
-
(1994)
Journal of the ACM
, vol.41
, Issue.1
, pp. 181-203
-
-
Alur, R.1
Henzinger, T.A.2
-
2
-
-
0142157015
-
A toolkit for managing enterprise privacy policies
-
European Symposium on Research in Computer Security
-
M. Backes, B. Pfitzmann, and M. Schunter. A toolkit for managing enterprise privacy policies. In European Symposium on Research in Computer Security, LNCS 2808, pages 101-119, 2003.
-
(2003)
LNCS
, vol.2808
, pp. 101-119
-
-
Backes, M.1
Pfitzmann, B.2
Schunter, M.3
-
3
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum. Privacy and contextual integrity: Framework and applications. In Proceedings of the 27th IEEE Symposium on Security and Privacy, pages 184-198, 2006.
-
(2006)
Proceedings of the 27th IEEE Symposium on Security and Privacy
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
4
-
-
35048898814
-
Privacy and utility in business processes
-
A. Barth, A. Datta, J. C. Mitchell, and S. Sundaram. Privacy and utility in business processes. In Proceedings of the 20th IEEE Computer Security Foundations Symposium, pages 279-294, 2007.
-
(2007)
Proceedings of the 20th IEEE Computer Security Foundations Symposium
, pp. 279-294
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Sundaram, S.4
-
6
-
-
0027113412
-
Local model checking for infinite state spaces
-
J. Bradfield and C. Stirling. Local model checking for infinite state spaces. Theoretical Computer Science, 96(1):157-174, 1992.
-
(1992)
Theoretical Computer Science
, vol.96
, Issue.1
, pp. 157-174
-
-
Bradfield, J.1
Stirling, C.2
-
8
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
T. Breaux and A. Antón. Analyzing regulatory rules for privacy and security requirements. IEEE Transactions on Software Engineering, 34(1):5-20, 2008.
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.1
Antón, A.2
-
11
-
-
78650220311
-
-
Technical Report CMU-CyLab-10-007, Carnegie Mellon University
-
H. DeYoung, D. Garg, D. Kaynar, and A. Datta. Logical specification of the GLBA and HIPAA privacy laws. Technical Report CMU-CyLab-10-007, Carnegie Mellon University, 2010.
-
(2010)
Logical Specification of the GLBA and HIPAA Privacy Laws
-
-
DeYoung, H.1
Garg, D.2
Kaynar, D.3
Datta, A.4
-
12
-
-
48949094978
-
Reasoning about conditions and exceptions to laws in regulatory conformance checking
-
N. Dinesh, A. K. Joshi, I. Lee, and O. Sokolsky. Reasoning about conditions and exceptions to laws in regulatory conformance checking. In Proceedings of the Ninth International Conference on Deontic Logic in Computer Science, pages 110-124, 2008.
-
(2008)
Proceedings of the Ninth International Conference on Deontic Logic in Computer Science
, pp. 110-124
-
-
Dinesh, N.1
Joshi, A.K.2
Lee, I.3
Sokolsky, O.4
-
13
-
-
84896694078
-
A verification tool for ERLANG
-
L.-Å. Fredlund, D. Gurov, T. Noll, M. Dam, T. Arts, and G. Chugunov. A verification tool for ERLANG. International Journal of Software Tools for Technology Transfer, 4(4):405-420, 2003.
-
(2003)
International Journal of Software Tools for Technology Transfer
, vol.4
, Issue.4
, pp. 405-420
-
-
Fredlund, L.-Å.1
Gurov, D.2
Noll, T.3
Dam, M.4
Arts, T.5
Chugunov, G.6
-
15
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 26(2):214-260, 2001.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
16
-
-
70350600124
-
A formalization of HIPAA for a medical messaging system
-
Proceedings of the 6th International Conference on Trust, Privacy, and Security in Digital Business
-
P. E. Lam, J. C. Mitchell, and S. Sundaram. A formalization of HIPAA for a medical messaging system. In Proceedings of the 6th International Conference on Trust, Privacy, and Security in Digital Business, LNCS 5695, pages 73-85, 2009.
-
(2009)
LNCS
, vol.5695
, pp. 73-85
-
-
Lam, P.E.1
Mitchell, J.C.2
Sundaram, S.3
-
20
-
-
1842538795
-
Privacy as contextual integrity
-
H. Nissenbaum. Privacy as contextual integrity. Washington Law Review, 79(1):119-158, 2004.
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 119-158
-
-
Nissenbaum, H.1
-
22
-
-
78650187458
-
Automata, Logics, and in nite Games
-
chapter Introduction to Guarded Logics, Springer-Verlag
-
T. Räsch. Automata, Logics, and In nite Games, chapter Introduction to Guarded Logics, pages 321-342. LNCS 2500. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2500
, pp. 321-342
-
-
Räsch, T.1
-
23
-
-
78650196636
-
-
US Congress. 15 USC x6801{x6809, November Available at
-
US Congress. Gramm-Leach-Bliley Act, Financial Privacy Rule. 15 USC x6801{x6809, November 1999. Available at http://www.law.cornell.edu/uscode/usc- sup-01-15-10-94-20-I.html.
-
(1999)
Gramm-Leach-Bliley Act, Financial Privacy Rule
-
-
|