-
1
-
-
0004072686
-
-
Addison-Wesley
-
A. V. Aho, M. S. Lam, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools, 2nd Edition. Addison-Wesley, 2006.
-
(2006)
Compilers: Principles, Techniques, and Tools, 2nd Edition
-
-
Aho, A.V.1
Lam, M.S.2
Sethi, R.3
Ullman, J.D.4
-
2
-
-
33746682538
-
Enhancing user privacy through data handling policies
-
DOI 10.1007/11805588-16, Data and Applications Security XX - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Proceedings
-
C. A. Ardagna, S. De Capitani di Vimercati, and P. Samarati. Enhancing user privacy through data handling policies. In Data and Applications Security, pages 224-236, Sophia Antipolis, France, 2006. (Pubitemid 44165890)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4127
, pp. 224-236
-
-
Ardagna, C.A.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
4
-
-
33744985815
-
Deriving semantic models from privacy policies
-
Stockholm, Sweden
-
T. D. Breaux and A. I. Antȯn. Deriving semantic models from privacy policies. In IEEE POLICY'05, pages 67-76, Stockholm, Sweden.
-
IEEE POLICY'05
, pp. 67-76
-
-
Breaux, T.D.1
Anton, A.I.2
-
5
-
-
30644474612
-
Purpose based access control of complex data for privacy protection
-
DOI 10.1145/1063979.1063998, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
-
J.-W. Byun, E. Bertino, and N. Li. Purpose based access control of complex data for privacy protection. In SACMAT'05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 102-110, New York, NY, USA, 2005. ACM. (Pubitemid 43087467)
-
(2005)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 102-110
-
-
Byun, J.-W.1
Bertino, E.2
Li, N.3
-
7
-
-
85037030721
-
Design and synthesis of synchronization skeletons using branching-time temporal logic
-
London, UK, Springer-Verlag
-
E. M. Clarke and E. A. Emerson. Design and synthesis of synchronization skeletons using branching-time temporal logic. In Logic of Programs, Workshop, pages 52-71, London, UK, 1982. Springer-Verlag.
-
(1982)
Logic of Programs, Workshop
, pp. 52-71
-
-
Clarke, E.M.1
Emerson, E.A.2
-
13
-
-
34547346853
-
On the modeling and analysis of obligations
-
DOI 10.1145/1180405.1180423, 1180423, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
K. Irwin, T. Yu, and W. H. Winsborough. On the modeling and analysis of obligations. In CCS'06: Proceedings of the 13th ACM conference on Computer and communications security, pages 134-143, Alexandria, Virginia, USA, 2006. (Pubitemid 47131363)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 134-143
-
-
Irwin, K.1
Yu, T.2
Winsborough, W.H.3
-
14
-
-
79952810999
-
-
(unpublished), December, Technical Report
-
M. Jafari. Nested purposes. Technical report, (unpublished), December 2009.
-
(2009)
Nested Purposes
-
-
Jafari, M.1
-
16
-
-
63749083742
-
Design of PriServ, a privacy service for DHTs
-
Nantes, France
-
M. Jawad, P. S. Alvaredo, and P. Valduriez. Design of PriServ, a privacy service for DHTs. In International Workshop on Privacy and Anonymity in the Information Society, pages 21-26, Nantes, France, 2008.
-
(2008)
International Workshop on Privacy and Anonymity in the Information Society
, pp. 21-26
-
-
Jawad, M.1
Alvaredo, P.S.2
Valduriez, P.3
-
17
-
-
84940106252
-
-
Oakland, CA, USA, May
-
T. Jensen, D. Le Metayer, and T. Thorn. Verification of control flow based security properties. pages 89 -103, Oakland, CA, USA, May 1999.
-
(1999)
Verification of Control Flow Based Security Properties
, pp. 89-103
-
-
Jensen, T.1
Metayer, D.L.2
Thorn, T.3
-
18
-
-
37249031542
-
A logical framework for history-based access control and reputation systems
-
K. Krukow, M. Nielsen, and V. Sassone. A logical framework for history-based access control and reputation systems. J. Comput. Secur., 16(1):63-101, 2008. (Pubitemid 350264870)
-
(2008)
Journal of Computer Security
, vol.16
, Issue.1
, pp. 63-101
-
-
Krukow, K.1
Nielsen, M.2
Sassone, V.3
-
19
-
-
70349333899
-
Privacy-aware role-based access control
-
Q. Ni, E. Bertino, J. Lobo, and S. B. Calo. Privacy-aware role-based access control. IEEE Security and Privacy, 7(4):35-43, 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.4
, pp. 35-43
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
Calo, S.B.4
-
20
-
-
79952129678
-
-
Organisation for the Advancement of Structured Information Standards
-
Organisation for the Advancement of Structured Information Standards. Privacy policy profile of XACML v2.0. http://docs.oasis-open.org/xacml/2.0/ access-control-xacml-2.0-privacy-profile-spec-os.pdf, 2005.
-
(2005)
Privacy Policy Profile of XACML V2.0
-
-
-
23
-
-
84874834655
-
Privacy promises, access control, and privacy management
-
Research Triangle Park, North Carolina, US, IEEE Computer Society
-
C. S. Powers, P. Ashley, and M. Schunter. Privacy promises, access control, and privacy management. In ISEC'02: Proceedings of the Third International Symposium on Electronic Commerce, pages 13-21, Research Triangle Park, North Carolina, US, 2002. IEEE Computer Society.
-
(2002)
ISEC'02: Proceedings of the Third International Symposium on Electronic Commerce
, pp. 13-21
-
-
Powers, C.S.1
Ashley, P.2
Schunter, M.3
|