-
2
-
-
77951543455
-
Obligation language and framework to enable privacy-aware SOA
-
Volume 5939 of Lecture Notes in Computer Science, Springer Berlin, Heidelberg
-
M. Ali, L. Bussard, and U. Pinsdorf. Obligation Language and Framework to Enable Privacy-Aware SOA. In Data Privacy Management and Autonomous Spontaneous Security, volume 5939 of Lecture Notes in Computer Science, pages 18-32. Springer Berlin, Heidelberg, 2010.
-
(2010)
Data Privacy Management and Autonomous Spontaneous Security
, pp. 18-32
-
-
Ali, M.1
Bussard, L.2
Pinsdorf, U.3
-
4
-
-
38049083819
-
Obligations and their interaction with programs
-
Dresden, Germany, September 24-26, Proceedings
-
D. J. Dougherty, K. Fisler, and S. Krishnamurthi. Obligations and their interaction with programs. In Proceedings of the 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, Proceedings, pages 375-389, 2007.
-
(2007)
Proceedings of the 12th European Symposium on Research in Computer Security
, pp. 375-389
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
7
-
-
38049040380
-
A policy language for distributed usage control
-
J. Biskup and J. Lopez, editors, volume 4734 of Lecture Notes in Computer Science, Springer Berlin, Heidelberg
-
M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter. A policy language for distributed usage control. In J. Biskup and J. Lopez, editors, Computer Security - ESORICS 2007, volume 4734 of Lecture Notes in Computer Science, pages 531-546. Springer Berlin, Heidelberg, 2008.
-
(2008)
Computer Security - ESORICS 2007
, pp. 531-546
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
8
-
-
34547346853
-
On the modeling and analysis of obligations
-
DOI 10.1145/1180405.1180423, 1180423, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
K. Irwin, T. Yu, and W. H. Winsborough. On the modeling and analysis of obligations. In Proceedings of the 13th ACM conference on Computer and communications security, pages 134-143, New York, NY, USA, 2006. ACM. (Pubitemid 47131363)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 134-143
-
-
Irwin, K.1
Yu, T.2
Winsborough, W.H.3
-
9
-
-
44149127452
-
Assigning responsibilities for failed obligations
-
Springer Boston
-
K. Irwin, T. Yu, and W. H. Winsborough. Assigning responsibilities for failed obligations. In IFIPTM Joined iTrust and PST Conference on Privacy, Trust Management and Security, pages 327-342. Springer Boston, 2008.
-
(2008)
IFIPTM Joined ITrust and PST Conference on Privacy, Trust Management and Security
, pp. 327-342
-
-
Irwin, K.1
Yu, T.2
Winsborough, W.H.3
-
10
-
-
57349136722
-
A general obligation model and continuity: Enhanced policy enforcement engine for usage control
-
New York, NY, USA, ACM
-
B. Katt, X. Zhang, R. Breu, M. Hafner, and J.-P. Seifert. A general obligation model and continuity: enhanced policy enforcement engine for usage control. In Proceedings of the 13th ACM symposium on Access control models and technologies, pages 123-132, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 123-132
-
-
Katt, B.1
Zhang, X.2
Breu, R.3
Hafner, M.4
Seifert, J.-P.5
-
11
-
-
0022334918
-
Ensuring integrity by adding obligations to privileges
-
Los Alamitos, CA, USA, IEEE Computer Society Press
-
N. H. Minsky and A. D. Lockman. Ensuring integrity by adding obligations to privileges. In Proceedings of the 8th international conference on Software engineering, pages 92-102, Los Alamitos, CA, USA, 1985. IEEE Computer Society Press.
-
(1985)
Proceedings of the 8th International Conference on Software Engineering
, pp. 92-102
-
-
Minsky, N.H.1
Lockman, A.D.2
-
12
-
-
57349158498
-
An obligation model bridging access control policies and privacy policies
-
New York, NY, USA, ACM
-
Q. Ni, E. Bertino, and J. Lobo. An obligation model bridging access control policies and privacy policies. In Proceedings of the 13th ACM symposium on Access control models and technologies, pages 133-142, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 133-142
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
13
-
-
34548016110
-
Privacy-aware role based access control
-
DOI 10.1145/1266840.1266848, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacy-aware role based access control. In Proceedings of the 12th ACM symposium on Access control models and technologies, pages 41-50, New York, NY, USA, 2007. ACM. (Pubitemid 47281536)
-
(2007)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 41-50
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
15
-
-
77954470017
-
Toward practical authorization dependent user obligation systems
-
M. Pontual, O. Chowdhury, W. Winsborough, T. Yu, and K. Irwin. Toward Practical Authorization Dependent User Obligation Systems. In Proceedings of the 5th International Symposium on ACM Symposium on Information, Computer and Communications Security, 2010.
-
(2010)
Proceedings of the 5th International Symposium on ACM Symposium on Information, Computer and Communications Security
-
-
Pontual, M.1
Chowdhury, O.2
Winsborough, W.3
Yu, T.4
Irwin, K.5
-
16
-
-
78649274775
-
Failure feedback for user obligation systems
-
M. Pontual, K. Irwin, O. Chowdhury, W. H. Winsborough, and T. Yu. Failure feedback for user obligation systems. In The Second IEEE International Conference on Information Privacy, Security, Risk and Trust, pages 713 -720, 2010.
-
(2010)
The Second IEEE International Conference on Information Privacy, Security, Risk and Trust
, pp. 713-720
-
-
Pontual, M.1
Irwin, K.2
Chowdhury, O.3
Winsborough, W.H.4
Yu, T.5
-
17
-
-
0001549660
-
The ARBAC97 model for role-based aministration of roles
-
Feb.
-
R. S. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based aministration of roles. ACM Transactions on Information and Systems Security, 2(1):105-135, Feb. 1999.
-
(1999)
ACM Transactions on Information and Systems Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
18
-
-
33947695249
-
-
volume 0, Los Alamitos, CA, USA, IEEE Computer Society
-
A. Sasturkar, A. Yang, S. D. Stoller, and C. Ramakrishnan. Policy analysis for administrative role based access control. volume 0, pages 124-138, Los Alamitos, CA, USA, 2006. IEEE Computer Society.
-
(2006)
Policy Analysis for Administrative Role Based Access Control
, pp. 124-138
-
-
Sasturkar, A.1
Yang, A.2
Stoller, S.D.3
Ramakrishnan, C.4
-
19
-
-
84988623695
-
A data sharing agreement framework
-
Kolkata, India, December 19-21, Proceedings
-
V. Swarup, L. Seligman, and A. Rosenthal. A data sharing agreement framework. In Information Systems Security, Second International Conference, Kolkata, India, December 19-21, Proceedings, pages 22-36, 2006.
-
(2006)
Information Systems Security, Second International Conference
, pp. 22-36
-
-
Swarup, V.1
Seligman, L.2
Rosenthal, A.3
-
20
-
-
85050273691
-
Program slicing
-
Piscataway, NJ, USA, IEEE Press
-
M. Weiser. Program slicing. In Proceedings of the 5th international conference on Software engineering, pages 439-449, Piscataway, NJ, USA, 1981. IEEE Press.
-
(1981)
Proceedings of the 5th International Conference on Software Engineering
, pp. 439-449
-
-
Weiser, M.1
|