-
1
-
-
33748543201
-
Distributed usage control
-
DOI 10.1145/1151030.1151053, Privacy and Security in Highly Dynamic Systems
-
A. Pretschner, M. Hilty, and D. Basin. Distributed usage control. Commun. ACM, 49(9):39-44, 2006. (Pubitemid 44371759)
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
2
-
-
3142523603
-
The UCON ABC usage control model
-
J. Park and R. Sandhu. The UCON ABC usage control model. ACM Trans. Inf. Syst. Secur., 7(1):128-174, 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
6
-
-
24944578141
-
Enterprise privacy authorization language (EPAL 1.2)
-
P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter. Enterprise Privacy Authorization Language (EPAL 1.2). IBM Technical Report, 2003. http://www.zurich.ibm.com/security/enterprise-privacy/epal/Specification/.
-
(2003)
IBM Technical Report
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
7
-
-
79952791039
-
-
Open Mobile Alliance. DRM Rights Expression Language V2.1, 2008. http://www.openmobilealliance.org/Technical/release-program/drm-v2-1.aspx.
-
(2008)
DRM Rights Expression Language V2.1
-
-
-
8
-
-
4143074723
-
A logical specification for usage control
-
ACM
-
X. Zhang, J. Park, F. Parisi-Presicce, and R. Sandhu. A logical specification for usage control. In SACMAT'04: Proceedings of the ninth ACM symposium on Access control models and technologies, pages 1-10. ACM, 2004.
-
(2004)
SACMAT'04: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies
, pp. 1-10
-
-
Zhang, X.1
Park, J.2
Parisi-Presicce, F.3
Sandhu, R.4
-
9
-
-
49249084578
-
A policy language for distributed usage control
-
M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter. A policy language for distributed usage control. In Proc. ESORICS, pages 531-546, 2008.
-
(2008)
Proc. ESORICS
, pp. 531-546
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
10
-
-
0001809810
-
The ponder policy specification language
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In Proc. Workshop on Policies for Distributed Systems and Networks, pages 18-39, 1995.
-
(1995)
Proc. Workshop on Policies for Distributed Systems and Networks
, pp. 18-39
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
12
-
-
72849109064
-
State-based usage control enforcement with data flow tracking using system call interposition
-
M. Harvan and A. Pretschner. State-based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. In Proc. 3rd Intl. Conf. on Network and System Security, pages 373-380, 2009.
-
(2009)
Proc. 3rd Intl. Conf. on Network and System Security
, pp. 373-380
-
-
Harvan, M.1
Pretschner, A.2
-
13
-
-
79952798543
-
Usage control enforcement with data flow tracking for x11
-
A. Pretschner, M. Buechler, M. Harvan, C. Schaefer, and T. Walter. Usage control enforcement with data ow tracking for x11. In Proc. 5th Intl. Workshop on Security and Trust Management, pages 124-137, 2009.
-
(2009)
Proc. 5th Intl. Workshop on Security and Trust Management
, pp. 124-137
-
-
Pretschner, A.1
Buechler, M.2
Harvan, M.3
Schaefer, C.4
Walter, T.5
-
14
-
-
69949167255
-
Security monitor inlining for multithreaded java
-
M. Dam, B. Jacobs, A. Lundblad, and F. Piessens. Security monitor inlining for multithreaded java. In Proc. ECOOP, pages pp. 546-569, 2009.
-
(2009)
Proc. ECOOP
, pp. 546-569
-
-
Dam, M.1
Jacobs, B.2
Lundblad, A.3
Piessens, F.4
-
15
-
-
48649101461
-
Extending the java virtual machine to enforce fine-grained security policies in mobile devices
-
IEEE Computer Society
-
I. Ion, B. Dragovic, and B. Crispo. Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. In Proc. Annual Computer Security Applications Conference, pages 233-242. IEEE Computer Society, 2007.
-
(2007)
Proc. Annual Computer Security Applications Conference
, pp. 233-242
-
-
Ion, I.1
Dragovic, B.2
Crispo, B.3
-
16
-
-
71649111935
-
The S3MS.NET run time monitor: Tool demonstration
-
L. Desmet, W. Joosen, F. Massacci, K. Naliuka, P. Philippaerts, F. Piessens, and D. Vanoverberghe. The S3MS.NET Run Time Monitor: Tool Demonstration. ENTCS, 253(5):153-159, 2009.
-
(2009)
ENTCS
, vol.253
, Issue.5
, pp. 153-159
-
-
Desmet, L.1
Joosen, W.2
Massacci, F.3
Naliuka, K.4
Philippaerts, P.5
Piessens, F.6
Vanoverberghe, D.7
-
18
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native Client: A Sandbox for Portable, Untrusted x86 Native Code. In Proc IEEE Symposium on Security and Privacy, pages 79-93, 2009.
-
(2009)
Proc IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
20
-
-
84903607772
-
Dynamic spyware analysis
-
June
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic spyware analysis. In Proceedings of USENIX Annual Technical Conference, June 2007.
-
(2007)
Proceedings of USENIX Annual Technical Conference
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
21
-
-
79952787128
-
-
August
-
Adobe livecycle rights management es. http://www.adobe.com/products/ livecycle/rightsmanagement/indepth.html, August 2010.
-
(2010)
Adobe Livecycle Rights Management es
-
-
-
22
-
-
79952778176
-
-
Microsoft. Windows Rights Management Services. http://www.microsoft.com/ windowsserver2008/en/us/ad-rms-overview.aspx, 2010.
-
(2010)
Windows Rights Management Services
-
-
-
23
-
-
49249092646
-
Usage control enforcement: Present and future
-
IEEE
-
A. Pretschner, M. Hilty, F. Schutz, C. Schaefer, and T. Walter. Usage control enforcement: Present and future. Security & Privacy, IEEE, 6(4):44-53, 2008.
-
(2008)
Security & Privacy
, vol.6
, Issue.4
, pp. 44-53
-
-
Pretschner, A.1
Hilty, M.2
Schutz, F.3
Schaefer, C.4
Walter, T.5
-
25
-
-
37249069564
-
Imagined communities: Awareness, information sharing, and privacy on the facebook
-
Robinson College, Cambridge, United Kingdom, June
-
A. Acquisti and R. Gross. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. In Privacy Enhancing Technologies Workshop (PET), Robinson College, Cambridge, United Kingdom, June 2006.
-
(2006)
Privacy Enhancing Technologies Workshop (PET)
-
-
Acquisti, A.1
Gross, R.2
-
26
-
-
84870159064
-
Trust and privacy concern within social networking sites: A comparison of Facebook and Myspace
-
Keystone, Colorado, USA, August
-
C. Dwyer and S. Hiltz. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado, USA, August 2007.
-
(2007)
Proceedings of the Thirteenth Americas Conference on Information Systems
-
-
Dwyer, C.1
Hiltz, S.2
-
27
-
-
79952800095
-
Facebook and the social dynamics of privacy
-
New York Law School
-
J. Grimmelmann. Facebook and the Social Dynamics of Privacy. Legal Studies, New York Law School, 7:33-34, 2008/2009.
-
(2008)
Legal Studies
, vol.7
, pp. 33-34
-
-
Grimmelmann, J.1
-
28
-
-
70749151743
-
Data control and social networking: Irreconcilable ideas?
-
A. Matwyshyn, editor, Stanford University Press
-
L. Edwards and I. Brown. Data Control and Social Networking: Irreconcilable Ideas? In A. Matwyshyn, editor, Harboring data: Information security, law, and the corporation. Stanford University Press, 2009.
-
(2009)
Harboring Data: Information Security, Law, and the Corporation
-
-
Edwards, L.1
Brown, I.2
-
29
-
-
79952802343
-
-
Seidenberg School of CSIS, Pace University, USA
-
K. Williams, A. Boyd, S. Densten, R. Chin, D. Diamond, and C. Morgenthaler. Social Networking Privacy Behaviors and Risks. Seidenberg School of CSIS, Pace University, USA, 2009.
-
(2009)
Social Networking Privacy Behaviors and Risks
-
-
Williams, K.1
Boyd, A.2
Densten, S.3
Chin, R.4
Diamond, D.5
Morgenthaler, C.6
-
30
-
-
70450204803
-
Decentralization: The future of online social networking
-
C. Yeung, I. Liccardi, K. Lu, O. Seneviratne, and T. Berners-Lee. Decentralization: The future of online social networking. In W3C Workshop on the Future of Social Networking Position Papers, 2009.
-
(2009)
W3C Workshop on the Future of Social Networking Position Papers
-
-
Yeung, C.1
Liccardi, I.2
Lu, K.3
Seneviratne, O.4
Berners-Lee, T.5
-
33
-
-
79952794213
-
-
September
-
Safebook publications. http://www.safebook.us/publications.html, September 2010.
-
(2010)
Safebook Publications
-
-
-
35
-
-
49149112974
-
Mynet: A platform for secure P2P personal and social networking services
-
Hong-Kong, China, March
-
D. Kalofonos, Z. Antoniou, F. Reynolds, M. Van-Kleek, J. Strauss, and P. Wisner. MyNet: a Platform for Secure P2P Personal and Social Networking Services. In 6th IEEE International Conference on Pervasive Computing and Communications (PERCOM'08), Hong-Kong, China, March 2008.
-
(2008)
6th IEEE International Conference on Pervasive Computing and Communications (PERCOM'08)
-
-
Kalofonos, D.1
Antoniou, Z.2
Reynolds, F.3
Van-Kleek, M.4
Strauss, J.5
Wisner, P.6
-
37
-
-
57049125175
-
A social networking-based access control scheme for personal content
-
Stevenson, Washington, October
-
K. Gollu, S. Saroiu, and A. Wolman. A Social Networking-Based Access Control Scheme for Personal Content. In 21st ACM Symposium on Operating Systems Principles (SOSP'07), Stevenson, Washington, October 2007.
-
(2007)
21st ACM Symposium on Operating Systems Principles (SOSP'07)
-
-
Gollu, K.1
Saroiu, S.2
Wolman, A.3
-
38
-
-
70249140248
-
Lockr: Social access control for web 2.0
-
Seattle, WA, August
-
A. Tootoonchian, K. Gollu, S. Saroiu, Y. Ganjali, and A. Wolman. Lockr: Social Access Control for Web 2.0. In First ACM SIGCOMM Workshop on Online Social Networks (WOSN), Seattle, WA, August 2008.
-
(2008)
First ACM SIGCOMM Workshop on Online Social Networks (WOSN)
-
-
Tootoonchian, A.1
Gollu, K.2
Saroiu, S.3
Ganjali, Y.4
Wolman, A.5
-
39
-
-
70350406398
-
Enforcing access control in web-based social networks
-
B. Carminati, E. Ferrari, and A. Perego. Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur., 13(1):1-38, 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.1
, pp. 1-38
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
40
-
-
79952808109
-
-
September
-
Website of the Scramble! project. http://www.primelife.eu/results/ opensource/39-scramble, September 2010.
-
(2010)
Website of the Scramble! Project
-
-
-
44
-
-
52149090525
-
D-foaf: Distributed identity management with access rights delegation
-
S. Kruk, S. Grzonkowski, A. Gzella, T. Woroniecki, and H. Choi. D-foaf: Distributed identity management with access rights delegation. In Proc. Asian Semantic Web Conference 2006, 2006.
-
(2006)
Proc. Asian Semantic Web Conference 2006
-
-
Kruk, S.1
Grzonkowski, S.2
Gzella, A.3
Woroniecki, T.4
Choi, H.5
-
45
-
-
79952807710
-
-
Jul
-
FOAFRealm. Foafrealm project site. http://www.foafrealm.org/Jul 2010.
-
(2010)
Foafrealm Project Site
-
-
-
47
-
-
79952783658
-
-
September
-
The tabulator extension. http://dig.csail.mit.edu/2007/tab, September 2010.
-
(2010)
The Tabulator Extension
-
-
-
49
-
-
79952797807
-
-
September
-
Browser market share. http://marketshare.hitslink.com/browser-market- share.aspx?qprid=0&qptimeframe=M&qpsp=138&qpnp=1, September 2010.
-
(2010)
Browser Market Share
-
-
-
50
-
-
79952780099
-
-
September
-
Phpizabi homepage. http://www.phpizabi.net/September 2010.
-
(2010)
Phpizabi Homepage
-
-
-
51
-
-
57849100172
-
Mechanisms for usage control
-
A. Pretschner, M. Hilty, D. Basin, C. Schaefer, and T. Walter. Mechanisms for Usage Control. In Proc. ACM Symposium on Information, Computer & Communication Security, pages 240-245, 2008.
-
(2008)
Proc. ACM Symposium on Information, Computer & Communication Security
, pp. 240-245
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
Schaefer, C.4
Walter, T.5
|