-
1
-
-
48249091293
-
A privacy-aware access control system
-
C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati, "A privacy-aware access control system," J. Comput. Secur., vol. 16, no. 4, pp. 369-397, 2008.
-
(2008)
J. Comput. Secur.
, vol.16
, Issue.4
, pp. 369-397
-
-
Ardagna, C.A.1
Cremonini, M.2
De Capitani Di Vimercati, S.3
Samarati, P.4
-
2
-
-
24944578141
-
-
P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter, "Enterprise privacy authorization language (EPAL 1.2)," 2003.
-
(2003)
Enterprise Privacy Authorization Language (EPAL 1.2)
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
5
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
P. Bonatti and P. Samarati, "A unified framework for regulating access and information release on the web," Journal of Computer Security, vol. 10, no. 3, pp. 241-272, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
6
-
-
79951934752
-
Downstream usage control
-
available at
-
L. Bussard, G. Neven, and F.-S. Preiss, "Downstream usage control," IBM Research Zurich, Tech. Rep. RZ 3777, 2010, available at domino.research.ibm.com/library/cyberdig.nsf.
-
(2010)
IBM Research Zurich, Tech. Rep. RZ 3777
-
-
Bussard, L.1
Neven, G.2
Preiss, F.-S.3
-
7
-
-
2442702369
-
-
ContentGuard
-
ContentGuard, "XrML 2.0 Technical Overview," http://www.xrml.org/reference/XrMLTechnicalOverviewV1.pdf, 2002.
-
(2002)
XrML 2.0 Technical Overview
-
-
-
8
-
-
33646071594
-
On obligations
-
M. Hilty, D. Basin, and A. Pretschner, "On obligations," Lecture Notes in Computer Science, vol. 3679, pp. 98-117, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3679
, pp. 98-117
-
-
Hilty, M.1
Basin, D.2
Pretschner, A.3
-
9
-
-
38049040380
-
A policy language for distributed usage control
-
J. Biskup and J. Lopez, Eds. Springer-Verlag
-
M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter, "A policy language for distributed usage control," in 12th European Symposium on Research in Computer Security (ESORICS 2007), ser. LNCS, J. Biskup and J. Lopez, Eds., vol. 4734. Springer-Verlag, 2007, pp. 531-546.
-
(2007)
12th European Symposium on Research in Computer Security (ESORICS 2007), Ser. LNCS
, vol.4734
, pp. 531-546
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
12
-
-
3142523603
-
The UCONABC usage control model
-
J. Park and R. Sandhu, "The UCONABC usage control model," ACM Trans. Inf. Syst. Secur., vol. 7, no. 1, pp. 128-174, 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
13
-
-
77951562952
-
Policy evolution in distributed usage control
-
Elsevier, June
-
A. Pretschner, F. Schütz, C. Schaefer, and T. Walter, "Policy evolution in distributed usage control," in 4th Intl. Workshop on Security and Trust Management. Elsevier, June 2008.
-
(2008)
4th Intl. Workshop on Security and Trust Management
-
-
Pretschner, A.1
Schütz, F.2
Schaefer, C.3
Walter, T.4
-
14
-
-
79951879225
-
An access control language for a general provenance model
-
N. Qun, X. Shouhuai, B. Elisa, S. Ravi, and H. Weili, "An access control language for a general provenance model," in Proceedings of SDM 2009, 2009, pp. 68-88.
-
(2009)
Proceedings of SDM 2009
, pp. 68-88
-
-
Qun, N.1
Shouhuai, X.2
Elisa, B.3
Ravi, S.4
Weili, H.5
-
15
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models," IEEE Computer, vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
18
-
-
17244379263
-
MPEG-21 rights expression language: Enabling interoperable digital rights management
-
DOI 10.1109/MMUL.2004.31
-
X. Wang, "Mpeg-21 rights expression language: Enabling interoperable digital rights management," IEEE MultiMedia, vol. 11, no. 4, pp. 84-87, 2004. (Pubitemid 40527352)
-
(2004)
IEEE Multimedia
, vol.11
, Issue.4
, pp. 84-87
-
-
Wang, X.1
|