-
1
-
-
0002983334
-
Automated Knowledge Acquisition from Regulatory Texts
-
Moulin, B., Rousseau, D.: Automated Knowledge Acquisition from Regulatory Texts. IEEE Expert 7(5), 27-35 (2002)
-
(2002)
IEEE Expert
, vol.7
, Issue.5
, pp. 27-35
-
-
Moulin, B.1
Rousseau, D.2
-
2
-
-
0034872752
-
Natural-Language Processing Support for Developing Policy-Governed Software Systems
-
Bret Michael, J., Ong, V., Rowe, N.C.: Natural-Language Processing Support for Developing Policy-Governed Software Systems. In: Proceedings of 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems (TOOLS 39), pp. 263-274 (2001)
-
(2001)
Proceedings of 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems (TOOLS 39)
, pp. 263-274
-
-
Bret Michael, J.1
Ong, V.2
Rowe, N.C.3
-
3
-
-
2342522578
-
Financial Privacy Policies and the Need for Standardization
-
Antón, A.I., Earp, J.B., He, Q., Stufflebeam, W., Bolchini, D., Jensen, C.: Financial Privacy Policies and the Need for Standardization. IEEE Security and Privacy 2(2), 36-45 (2004)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.2
, pp. 36-45
-
-
Antón, A.I.1
Earp, J.B.2
He, Q.3
Stufflebeam, W.4
Bolchini, D.5
Jensen, C.6
-
6
-
-
44649180639
-
Extracting Rights and Obligations from Regulations: Toward a Tool-Supported Process
-
Kiyavitskaya, N., Zeni, N., Breaux, T.D., Antón, A.I., Cordy, J.R., Mich, L., Mylopoulos, J.: Extracting Rights and Obligations from Regulations: Toward a Tool-Supported Process. In: Proceedings of ASE 2007 (2007)
-
(2007)
Proceedings of ASE 2007
-
-
Kiyavitskaya, N.1
Zeni, N.2
Breaux, T.D.3
Antón, A.I.4
Cordy, J.R.5
Mich, L.6
Mylopoulos, J.7
-
7
-
-
38149018837
-
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations
-
Breaux, T.D., Vail, M.W., Antón, A.I.: Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations. In: Proceedings of 14th IEEE International Requirements Engineering Conference, RE 2006 (2006)
-
(2006)
Proceedings of 14th IEEE International Requirements Engineering Conference, RE 2006
-
-
Breaux, T.D.1
Vail, M.W.2
Antón, A.I.3
-
8
-
-
40449096076
-
Analyzing Regulatory Rules for Privacy and Security Requirements
-
Breaux, T.D., Antón, A.I.: Analyzing Regulatory Rules for Privacy and Security Requirements. IEEE Transactions on Software Engineering 34(1), 5-20 (2008)
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Antón, A.I.2
-
9
-
-
79960226483
-
Knowledge Extraction from Text: Machine Learning for Text-to-rule Translation
-
Brazdil, P.B. (ed.) ECML 1993. Springer, Heidelberg
-
Delannoy, J.F., Feng, C., Matwin, S., Szpakowicz, S.: Knowledge Extraction from Text: Machine Learning for Text-to-rule Translation. In: Brazdil, P.B. (ed.) ECML 1993. LNCS, vol. 667. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.667
-
-
Delannoy, J.F.1
Feng, C.2
Matwin, S.3
Szpakowicz, S.4
-
10
-
-
79960267826
-
From Text to Horn Clauses: Combining Linguistic Analysis and Machine Learning
-
Delisle, S., Barker, K., Delannoy, J., Matwin, S., Szpakowicz, S.: From Text to Horn Clauses: Combining Linguistic Analysis and Machine Learning. In: Proceedings of Canadian AI Conference, AI/GI/CV 1994 (1994)
-
(1994)
Proceedings of Canadian AI Conference, AI/GI/CV 1994
-
-
Delisle, S.1
Barker, K.2
Delannoy, J.3
Matwin, S.4
Szpakowicz, S.5
-
12
-
-
33751063543
-
Privacy and Contextual Integrity: Framework and Applications
-
Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and Contextual Integrity: Framework and Applications. In: Proceedings of IEEE Symposium on Security and Privacy (2006)
-
Proceedings of IEEE Symposium on Security and Privacy (2006)
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
13
-
-
33947620690
-
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
-
May, M.J., Gunter, C.A., Lee, I.: Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. In: Proceedings of Computer Security Foundations Workshop, CSFW 2006 (2006)
-
(2006)
Proceedings of Computer Security Foundations Workshop, CSFW 2006
-
-
May, M.J.1
Gunter, C.A.2
Lee, I.3
-
14
-
-
38049149416
-
An Empirical Study of Natural Language Parsing of Privacy Policy Rules Using the SPARCLE Policy Workbench
-
Brodie, C.A., Karat, C., Karat, J.: An Empirical Study of Natural Language Parsing of Privacy Policy Rules Using the SPARCLE Policy Workbench. In: Proceedings of Symposium on Usable Privacy and Security, SOUPS (2006)
-
Proceedings of Symposium on Usable Privacy and Security, SOUPS (2006)
-
-
Brodie, C.A.1
Karat, C.2
Karat, J.3
-
16
-
-
84891462186
-
-
Springer, Heidelberg
-
Davies, J., Grobelnik, M., Mladenic, D. (eds.): Semantic Knowledge Management. Springer, Heidelberg (2009)
-
(2009)
Semantic Knowledge Management
-
-
Davies, J.1
Grobelnik, M.2
Mladenic, D.3
-
17
-
-
79960239806
-
-
IOS Press, Amsterdam
-
Breuker, J., Casanovas, P., Klein, M.C.A., Francesconi, E. (eds.): Law, Ontologies and the Semantic Web. IOS Press, Amsterdam (2009)
-
(2009)
Law, Ontologies and the Semantic Web
-
-
Breuker, J.1
Casanovas, P.2
Klein, M.C.A.3
Francesconi, E.4
-
18
-
-
79960224000
-
-
Springer, Heidelberg
-
Casanovas, P., Sartor, G., Casellas, N., Rubino, R. (eds.): Computable Models of the Law. Springer, Heidelberg (2008)
-
(2008)
Computable Models of the Law
-
-
Casanovas, P.1
Sartor, G.2
Casellas, N.3
Rubino, R.4
-
19
-
-
26944456416
-
-
Springer, Heidelberg
-
Benjamins, V.R., Casanovas, P., Breuker, J., Gangemi, A. (eds.): Law and the Semantic Web. Springer, Heidelberg (2005)
-
(2005)
Law and the Semantic Web
-
-
Benjamins, V.R.1
Casanovas, P.2
Breuker, J.3
Gangemi, A.4
-
21
-
-
84959045053
-
A Conceptual Model for Privacy Policies with Consent and Revocation Requirements
-
Proceedings of PrimeLife/IFIP Summer School 2010: Privacy and Identity Management for Life. Springer, Heidelberg
-
Mont, M.C., Pearson, S., Creese, S., Goldsmith, M., Papanikolaou, N.: A Conceptual Model for Privacy Policies with Consent and Revocation Requirements. In: Proceedings of PrimeLife/IFIP Summer School 2010: Privacy and Identity Management for Life. LNCS. Springer, Heidelberg (2010)
-
(2010)
LNCS
-
-
Mont, M.C.1
Pearson, S.2
Creese, S.3
Goldsmith, M.4
Papanikolaou, N.5
-
22
-
-
72849151145
-
Scalable, accountable privacy management for large organizations
-
Pearson, S., Rao, P., Sander, T., Parry, A., Paull, A., Patruni, S., Dandamudi-Ratnakar, V., Sharma, P.: Scalable, accountable privacy management for large organizations. In: Proceedings of 13th Enterprise Distributed Object Computing Conference Workshop (EDOCW 2009), pp. 168-175 (2009)
-
(2009)
Proceedings of 13th Enterprise Distributed Object Computing Conference Workshop (EDOCW 2009)
, pp. 168-175
-
-
Pearson, S.1
Rao, P.2
Sander, T.3
Parry, A.4
Paull, A.5
Patruni, S.6
Dandamudi-Ratnakar, V.7
Sharma, P.8
-
23
-
-
79960232549
-
-
SPIN, http://www.spinroot.org
-
-
-
-
24
-
-
79960223017
-
-
IBM REALM Project, http://www.zurich.ibm.com/security/publications/2006/ REALM-atIRIS2006-20060217.pdf
-
IBM REALM Project
-
-
-
26
-
-
77049125775
-
Privacy Injector - Automated Privacy Enforcement through Aspects
-
Danezis, G., Golle, P. (eds.) PET 2006. Springer, Heidelberg
-
Berghe, C.V., Schunter, M.: Privacy Injector - Automated Privacy Enforcement through Aspects. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 99-117. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4258
, pp. 99-117
-
-
Berghe, C.V.1
Schunter, M.2
-
27
-
-
55549122324
-
Situation-Based Access Control: Privacy management via modeling of patient data access scenarios
-
to appear
-
Peleg, M., Beimel, D., Dori, D., Denekamp, Y.: Situation-Based Access Control: privacy management via modeling of patient data access scenarios. Journal of Biomedical Informatics (to appear)
-
Journal of Biomedical Informatics
-
-
Peleg, M.1
Beimel, D.2
Dori, D.3
Denekamp, Y.4
-
29
-
-
11244331795
-
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
-
IEEE Computer Society, Los Alamitos
-
Becker, M.Y., Sewell, P.: Cassandra: Distributed Access Control Policies with Tunable Expressiveness. In: Proceedings of 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), Yorktown Heights, NY, USA, June 7-9, pp. 159-168. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
Proceedings of 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), Yorktown Heights, NY, USA, June 7-9
, pp. 159-168
-
-
Becker, M.Y.1
Sewell, P.2
-
30
-
-
84864578620
-
Enhancing privacy in cloud computing via policy-based obfuscation
-
doi:10.1007/s11227-010-0425-z
-
Mowbray, M., Pearson, S., Shen, Y.: Enhancing privacy in cloud computing via policy-based obfuscation. Journal of Supercomputing, doi:10.1007/s11227-010- 0425-z
-
Journal of Supercomputing
-
-
Mowbray, M.1
Pearson, S.2
Shen, Y.3
|