메뉴 건너뛰기




Volumn , Issue , 2011, Pages 213-224

Towards defining semantic foundations for purpose-based privacy policies

Author keywords

Access control; Modal logic; Privacy policy; Purpose

Indexed keywords

ACTION GRAPHS; BUSINESS PROCESS; BUSINESS SYSTEMS; FORMAL EXPRESSIONS; MODAL LOGIC; MODEL CHECKING ALGORITHM; PRIVACY POLICIES; PRIVACY POLICY; PURPOSE; SEMANTIC FOUNDATION; SEMANTIC MODEL;

EID: 79952805205     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1943513.1943541     Document Type: Conference Paper
Times cited : (35)

References (28)
  • 4
    • 33744985815 scopus 로고    scopus 로고
    • Deriving semantic models from privacy policies
    • Stockholm, Sweden
    • T. D. Breaux and A. I. Antȯn. Deriving semantic models from privacy policies. In IEEE POLICY'05, pages 67-76, Stockholm, Sweden.
    • IEEE POLICY'05 , pp. 67-76
    • Breaux, T.D.1    Anton, A.I.2
  • 5
    • 30644474612 scopus 로고    scopus 로고
    • Purpose based access control of complex data for privacy protection
    • DOI 10.1145/1063979.1063998, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
    • J.-W. Byun, E. Bertino, and N. Li. Purpose based access control of complex data for privacy protection. In SACMAT'05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 102-110, New York, NY, USA, 2005. ACM. (Pubitemid 43087467)
    • (2005) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , pp. 102-110
    • Byun, J.-W.1    Bertino, E.2    Li, N.3
  • 7
    • 85037030721 scopus 로고
    • Design and synthesis of synchronization skeletons using branching-time temporal logic
    • London, UK, Springer-Verlag
    • E. M. Clarke and E. A. Emerson. Design and synthesis of synchronization skeletons using branching-time temporal logic. In Logic of Programs, Workshop, pages 52-71, London, UK, 1982. Springer-Verlag.
    • (1982) Logic of Programs, Workshop , pp. 52-71
    • Clarke, E.M.1    Emerson, E.A.2
  • 13
    • 34547346853 scopus 로고    scopus 로고
    • On the modeling and analysis of obligations
    • DOI 10.1145/1180405.1180423, 1180423, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • K. Irwin, T. Yu, and W. H. Winsborough. On the modeling and analysis of obligations. In CCS'06: Proceedings of the 13th ACM conference on Computer and communications security, pages 134-143, Alexandria, Virginia, USA, 2006. (Pubitemid 47131363)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 134-143
    • Irwin, K.1    Yu, T.2    Winsborough, W.H.3
  • 14
    • 79952810999 scopus 로고    scopus 로고
    • (unpublished), December, Technical Report
    • M. Jafari. Nested purposes. Technical report, (unpublished), December 2009.
    • (2009) Nested Purposes
    • Jafari, M.1
  • 18
    • 37249031542 scopus 로고    scopus 로고
    • A logical framework for history-based access control and reputation systems
    • K. Krukow, M. Nielsen, and V. Sassone. A logical framework for history-based access control and reputation systems. J. Comput. Secur., 16(1):63-101, 2008. (Pubitemid 350264870)
    • (2008) Journal of Computer Security , vol.16 , Issue.1 , pp. 63-101
    • Krukow, K.1    Nielsen, M.2    Sassone, V.3
  • 20
    • 79952129678 scopus 로고    scopus 로고
    • Organisation for the Advancement of Structured Information Standards
    • Organisation for the Advancement of Structured Information Standards. Privacy policy profile of XACML v2.0. http://docs.oasis-open.org/xacml/2.0/ access-control-xacml-2.0-privacy-profile-spec-os.pdf, 2005.
    • (2005) Privacy Policy Profile of XACML V2.0


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.