-
1
-
-
56349121964
-
Towards the Development of Privacy-Aware Systems
-
Guarda, P., Zannone, N.: Towards the Development of Privacy-Aware Systems. Information and Software Technology 51(2), 337-350 (2009)
-
(2009)
Information and Software Technology
, vol.51
, Issue.2
, pp. 337-350
-
-
Guarda, P.1
Zannone, N.2
-
2
-
-
0242674432
-
Hippocratic Databases
-
Morgan Kaufmann, San Francisco
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases. In: Proceedings of the 28th International Conference on Very Large Data Bases, pp. 143-154. Morgan Kaufmann, San Francisco (2002)
-
(2002)
Proceedings of the 28th International Conference on Very Large Data Bases
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
0037703469
-
E-P3P privacy policies and privacy authorization
-
ACM, New York
-
Ashley, P., Hada, S., Karjoth, G., Schunter, M.: E-P3P privacy policies and privacy authorization. In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, pp. 103-109. ACM, New York (2002)
-
(2002)
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society
, pp. 103-109
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Schunter, M.E.4
-
4
-
-
45749089618
-
Purpose based access control for privacy protection in relational database systems
-
Byun, J.-W., Li, N.: Purpose based access control for privacy protection in relational database systems. VLDB J 17(4), 603-619 (2008)
-
(2008)
VLDB J
, vol.17
, Issue.4
, pp. 603-619
-
-
Byun, J.-W.1
Li, N.2
-
5
-
-
36049032185
-
Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations
-
Massacci, F., Mylopoulos, J., Zannone, N.: Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations. VLDB J 15(4), 370-387 (2006)
-
(2006)
VLDB J
, vol.15
, Issue.4
, pp. 370-387
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
8
-
-
84957805078
-
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data
-
Privacy Enhancing Technologies
-
Karjoth, G., Schunter, M., Waidner, M.: Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 69-84. Springer, Heidelberg (2003) (Pubitemid 36309880)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2482
, pp. 69-84
-
-
Karjoth, G.1
Schunter, M.2
Waidner, M.3
-
9
-
-
33947628689
-
Comprehensive management of the access to the electronic patient record: Towards trans-institutional networks
-
Lovis, C., Spahni, S., Cassoni, N., Geissbuhler, A.: Comprehensive management of the access to the electronic patient record: Towards trans-institutional networks. Int. J. of Medical Informatics 76(5-6), 466-470 (2007)
-
(2007)
Int. J. of Medical Informatics
, vol.76
, Issue.5-6
, pp. 466-470
-
-
Lovis, C.1
Spahni, S.2
Cassoni, N.3
Geissbuhler, A.4
-
10
-
-
37149053881
-
Calculus for Orchestration of Web Services
-
De Nicola, R. (ed.) ESOP 2007. Springer, Heidelberg
-
Lapadula, A., Pugliese, R., Tiezzi, F.: Calculus for Orchestration of Web Services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 33-47. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4421
, pp. 33-47
-
-
Lapadula, A.1
Pugliese, R.2
Tiezzi, F.3
-
11
-
-
41649087956
-
-
Version 2.0, OASIS Standard
-
OASIS,Web Services Business Process Execution Language - Version 2.0, OASIS Standard (2007), http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS. html
-
(2007)
Web Services Business Process Execution Language
-
-
-
12
-
-
33750009286
-
-
Object Management Group, (version 1.2), OMG document
-
Object Management Group, Business Process Modeling Notation (BPMN) Specification (version 1.2), OMG document (2009), http://www.omg.org/spec/BPMN/ 1.2/
-
(2009)
Business Process Modeling Notation (BPMN) Specification
-
-
-
13
-
-
35748949584
-
Conformance checking of processes based on monitoring real behavior
-
Rozinat, A., Van der Aalst,W.M.P.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64-95 (2008)
-
(2008)
Inf. Syst.
, vol.33
, Issue.1
, pp. 64-95
-
-
Rozinat, A.1
Van Der Aalst, W.M.P.2
-
15
-
-
2942514538
-
The origins of structural operational semantics
-
Plotkin, G.: The origins of structural operational semantics. J. Log. Algebr. Program 60, 3-15 (2004)
-
(2004)
J. Log. Algebr. Program
, vol.60
, pp. 3-15
-
-
Plotkin, G.1
-
16
-
-
45749109040
-
Formal analysis of BPMN via a translation into COWS
-
Wang, A.H., Tennenholtz, M. (eds.) COORDINATION 2008. Springer, Heidelberg
-
Prandi, D., Quaglia, P., Zannone, N.: Formal analysis of BPMN via a translation into COWS. In:Wang, A.H., Tennenholtz, M. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 249-263. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5052
, pp. 249-263
-
-
Prandi, D.1
Quaglia, P.2
Zannone, N.3
-
18
-
-
65849178422
-
A new approach to secure logging
-
Ma, D., Tsudik, G.: A new approach to secure logging. ACM Trans. Storage 5(1), 1-21 (2009)
-
(2009)
ACM Trans. Storage
, vol.5
, Issue.1
, pp. 1-21
-
-
Ma, D.1
Tsudik, G.2
-
19
-
-
85021950441
-
Secure audit logs to support computer forensics
-
Schneier, B., Kelsey, J.: Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur. 2(2), 159-176 (1999)
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
20
-
-
39049126192
-
A study of access control requirements for healthcare systems based on audit trails from access logs
-
IEEE Computer Society, Los Alamitos
-
Rostad, L., Edsberg, O.: A study of access control requirements for healthcare systems based on audit trails from access logs. In: Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 175-186. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference
, pp. 175-186
-
-
Rostad, L.1
Edsberg, O.2
-
21
-
-
45749114538
-
Amodel checking approach for verifying COWS specifications
-
Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008. Springer, Heidelberg
-
Fantechi, A., Gnesi, S., Lapadula, A.,Mazzanti, F., Pugliese, R., Tiezzi, F.: Amodel checking approach for verifying COWS specifications. In: Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008. LNCS, vol. 4961, pp. 230-245. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4961
, pp. 230-245
-
-
Fantechi, A.1
Gnesi, S.2
Lapadula, A.3
Mazzanti, F.4
Pugliese, R.5
Tiezzi, F.6
-
24
-
-
2442516401
-
Efficient comparison of enterprise privacy policies
-
ACM, New York
-
Backes, M., Karjoth, G., Bagga,W., Schunter, M.: Efficient comparison of enterprise privacy policies. In: Proceedings of the 2004 ACMSymposium on Applied Computing, pp. 375-382. ACM, New York (2004)
-
(2004)
Proceedings of the 2004 ACMSymposium on Applied Computing
, pp. 375-382
-
-
Backes, M.1
Karjoth, G.2
Bagga, W.3
Schunter, M.4
-
25
-
-
33646071594
-
On Obligations
-
di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
-
Hilty, M., Basin, D.A., Pretschner, A.: On Obligations. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 98-117. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3679
, pp. 98-117
-
-
Hilty, M.1
Basin, D.A.2
Pretschner, A.3
-
26
-
-
33745883651
-
-
Version 2.0, OASIS Standard
-
OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0, OASIS Standard (2005), http://docs.oasis-open.org/xacml/2.0/access control-xacml-2.0-core-spec-os.pdf
-
(2005)
EXtensible Access Control Markup Language (XACML)
-
-
-
28
-
-
47249106078
-
A formal implementation of value commitment
-
Gairing, M. (ed.) ESOP 2008. Springer, Heidelberg
-
Fournet, C., Guts, N., Nardelli, F.Z.: A formal implementation of value commitment. In: Gairing, M. (ed.) ESOP 2008. LNCS, vol. 4960, pp. 383-397. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4960
, pp. 383-397
-
-
Fournet, C.1
Guts, N.2
Nardelli, F.Z.3
-
29
-
-
33947670402
-
Auditbased compliance control
-
Cederquist, J.G., Corin, R.J., Dekker, M.A.C., Etalle, S., Den Hartog, J.I., Lenzini, G.: Auditbased compliance control. Int. J. Inf. Sec. 6(2-3), 133-151 (2007)
-
(2007)
Int. J. Inf. Sec.
, vol.6
, Issue.2-3
, pp. 133-151
-
-
Cederquist, J.G.1
Corin, R.J.2
Dekker, M.A.C.3
Etalle, S.4
Den Hartog, J.I.5
Lenzini, G.6
-
30
-
-
85135991839
-
Auditing Compliance with a Hippocratic Database
-
VLDB Endowment
-
Agrawal, R., Bayardo, R., Faloutsos, C., Kiernan, J., Rantzau, R., Srikant, R.: Auditing Compliance with a Hippocratic Database. In: Proceedings of the 30th International Conference on Very Large Data Bases. VLDB Endowment, pp. 516-527 (2004)
-
(2004)
Proceedings of the 30th International Conference on Very Large Data Bases
, pp. 516-527
-
-
Agrawal, R.1
Bayardo, R.2
Faloutsos, C.3
Kiernan, J.4
Rantzau, R.5
Srikant, R.6
-
31
-
-
0038825045
-
Anomaly detection using call stack information
-
IEEE Computer Society, Los Alamitos
-
Feng, H.H., Kolesnikov, O.M., Fogla, P., Lee, W., Gong, W.: Anomaly detection using call stack information. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 62-75. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 62-75
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
33
-
-
4544353101
-
Workflow Mining: Discovering Process Models from Event Logs
-
Van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128-1142 (2004)
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, Issue.9
, pp. 1128-1142
-
-
Van Der Aalst, W.M.P.1
Weijters, T.2
Maruster, L.3
|