메뉴 건너뛰기




Volumn 6933 LNCS, Issue , 2011, Pages 145-168

Purpose control: Did you process the data for the intended purpose?

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 80052772821     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23556-6_10     Document Type: Conference Paper
Times cited : (42)

References (33)
  • 1
    • 56349121964 scopus 로고    scopus 로고
    • Towards the Development of Privacy-Aware Systems
    • Guarda, P., Zannone, N.: Towards the Development of Privacy-Aware Systems. Information and Software Technology 51(2), 337-350 (2009)
    • (2009) Information and Software Technology , vol.51 , Issue.2 , pp. 337-350
    • Guarda, P.1    Zannone, N.2
  • 4
    • 45749089618 scopus 로고    scopus 로고
    • Purpose based access control for privacy protection in relational database systems
    • Byun, J.-W., Li, N.: Purpose based access control for privacy protection in relational database systems. VLDB J 17(4), 603-619 (2008)
    • (2008) VLDB J , vol.17 , Issue.4 , pp. 603-619
    • Byun, J.-W.1    Li, N.2
  • 5
    • 36049032185 scopus 로고    scopus 로고
    • Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations
    • Massacci, F., Mylopoulos, J., Zannone, N.: Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations. VLDB J 15(4), 370-387 (2006)
    • (2006) VLDB J , vol.15 , Issue.4 , pp. 370-387
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 8
    • 84957805078 scopus 로고    scopus 로고
    • Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data
    • Privacy Enhancing Technologies
    • Karjoth, G., Schunter, M., Waidner, M.: Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 69-84. Springer, Heidelberg (2003) (Pubitemid 36309880)
    • (2003) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2482 , pp. 69-84
    • Karjoth, G.1    Schunter, M.2    Waidner, M.3
  • 9
    • 33947628689 scopus 로고    scopus 로고
    • Comprehensive management of the access to the electronic patient record: Towards trans-institutional networks
    • Lovis, C., Spahni, S., Cassoni, N., Geissbuhler, A.: Comprehensive management of the access to the electronic patient record: Towards trans-institutional networks. Int. J. of Medical Informatics 76(5-6), 466-470 (2007)
    • (2007) Int. J. of Medical Informatics , vol.76 , Issue.5-6 , pp. 466-470
    • Lovis, C.1    Spahni, S.2    Cassoni, N.3    Geissbuhler, A.4
  • 10
    • 37149053881 scopus 로고    scopus 로고
    • Calculus for Orchestration of Web Services
    • De Nicola, R. (ed.) ESOP 2007. Springer, Heidelberg
    • Lapadula, A., Pugliese, R., Tiezzi, F.: Calculus for Orchestration of Web Services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 33-47. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4421 , pp. 33-47
    • Lapadula, A.1    Pugliese, R.2    Tiezzi, F.3
  • 11
    • 41649087956 scopus 로고    scopus 로고
    • Version 2.0, OASIS Standard
    • OASIS,Web Services Business Process Execution Language - Version 2.0, OASIS Standard (2007), http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS. html
    • (2007) Web Services Business Process Execution Language
  • 12
    • 33750009286 scopus 로고    scopus 로고
    • Object Management Group, (version 1.2), OMG document
    • Object Management Group, Business Process Modeling Notation (BPMN) Specification (version 1.2), OMG document (2009), http://www.omg.org/spec/BPMN/ 1.2/
    • (2009) Business Process Modeling Notation (BPMN) Specification
  • 13
    • 35748949584 scopus 로고    scopus 로고
    • Conformance checking of processes based on monitoring real behavior
    • Rozinat, A., Van der Aalst,W.M.P.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64-95 (2008)
    • (2008) Inf. Syst. , vol.33 , Issue.1 , pp. 64-95
    • Rozinat, A.1    Van Der Aalst, W.M.P.2
  • 15
    • 2942514538 scopus 로고    scopus 로고
    • The origins of structural operational semantics
    • Plotkin, G.: The origins of structural operational semantics. J. Log. Algebr. Program 60, 3-15 (2004)
    • (2004) J. Log. Algebr. Program , vol.60 , pp. 3-15
    • Plotkin, G.1
  • 16
    • 45749109040 scopus 로고    scopus 로고
    • Formal analysis of BPMN via a translation into COWS
    • Wang, A.H., Tennenholtz, M. (eds.) COORDINATION 2008. Springer, Heidelberg
    • Prandi, D., Quaglia, P., Zannone, N.: Formal analysis of BPMN via a translation into COWS. In:Wang, A.H., Tennenholtz, M. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 249-263. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5052 , pp. 249-263
    • Prandi, D.1    Quaglia, P.2    Zannone, N.3
  • 18
    • 65849178422 scopus 로고    scopus 로고
    • A new approach to secure logging
    • Ma, D., Tsudik, G.: A new approach to secure logging. ACM Trans. Storage 5(1), 1-21 (2009)
    • (2009) ACM Trans. Storage , vol.5 , Issue.1 , pp. 1-21
    • Ma, D.1    Tsudik, G.2
  • 19
    • 85021950441 scopus 로고    scopus 로고
    • Secure audit logs to support computer forensics
    • Schneier, B., Kelsey, J.: Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur. 2(2), 159-176 (1999)
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.2 , pp. 159-176
    • Schneier, B.1    Kelsey, J.2
  • 20
    • 39049126192 scopus 로고    scopus 로고
    • A study of access control requirements for healthcare systems based on audit trails from access logs
    • IEEE Computer Society, Los Alamitos
    • Rostad, L., Edsberg, O.: A study of access control requirements for healthcare systems based on audit trails from access logs. In: Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 175-186. IEEE Computer Society, Los Alamitos (2006)
    • (2006) Proceedings of the 22nd Annual Computer Security Applications Conference , pp. 175-186
    • Rostad, L.1    Edsberg, O.2
  • 21
    • 45749114538 scopus 로고    scopus 로고
    • Amodel checking approach for verifying COWS specifications
    • Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008. Springer, Heidelberg
    • Fantechi, A., Gnesi, S., Lapadula, A.,Mazzanti, F., Pugliese, R., Tiezzi, F.: Amodel checking approach for verifying COWS specifications. In: Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008. LNCS, vol. 4961, pp. 230-245. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4961 , pp. 230-245
    • Fantechi, A.1    Gnesi, S.2    Lapadula, A.3    Mazzanti, F.4    Pugliese, R.5    Tiezzi, F.6
  • 25
    • 33646071594 scopus 로고    scopus 로고
    • On Obligations
    • di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
    • Hilty, M., Basin, D.A., Pretschner, A.: On Obligations. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 98-117. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3679 , pp. 98-117
    • Hilty, M.1    Basin, D.A.2    Pretschner, A.3
  • 26
    • 33745883651 scopus 로고    scopus 로고
    • Version 2.0, OASIS Standard
    • OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0, OASIS Standard (2005), http://docs.oasis-open.org/xacml/2.0/access control-xacml-2.0-core-spec-os.pdf
    • (2005) EXtensible Access Control Markup Language (XACML)
  • 28
    • 47249106078 scopus 로고    scopus 로고
    • A formal implementation of value commitment
    • Gairing, M. (ed.) ESOP 2008. Springer, Heidelberg
    • Fournet, C., Guts, N., Nardelli, F.Z.: A formal implementation of value commitment. In: Gairing, M. (ed.) ESOP 2008. LNCS, vol. 4960, pp. 383-397. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4960 , pp. 383-397
    • Fournet, C.1    Guts, N.2    Nardelli, F.Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.