메뉴 건너뛰기




Volumn 6984 LNCS, Issue , 2011, Pages 198-211

Semantics-enabled policies for information sharing and protection in the cloud

Author keywords

cloud computing; data protection; information sharing; national security; privacy for social network cloud; semantics enabled policies

Indexed keywords

COMPUTING PLATFORM; DATA PROTECTION; DATA SHARING; INFORMATION SHARING; LEGAL REGULATION; NATIONAL SECURITY; ONTOLOGIES AND RULES; SECURITY AND PRIVACY; SEMANTICS-ENABLED POLICIES; UTILITY COMPUTING;

EID: 80054081293     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-24704-0_24     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 2
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Takabi, H., et al.: Security and privacy challenges in cloud computing environments. IEEE Seurity & Privacy 8, 24-31 (2010)
    • (2010) IEEE Seurity & Privacy , vol.8 , pp. 24-31
    • Takabi, H.1
  • 3
    • 34547332566 scopus 로고    scopus 로고
    • A roadmap for comprehensive online for privacy policy management
    • Antón, I.A., et al.: A roadmap for comprehensive online for privacy policy management. Comm. of the ACM 50, 109-116 (2007)
    • (2007) Comm. of the ACM , vol.50 , pp. 109-116
    • Antón, I.A.1
  • 5
    • 48249091293 scopus 로고    scopus 로고
    • A privacy-aware access control system
    • Ardagna, A.C., et al.: A privacy-aware access control system. Journal of Computer Security 16, 369-397 (2008)
    • (2008) Journal of Computer Security , vol.16 , pp. 369-397
    • Ardagna, A.C.1
  • 6
    • 84893064260 scopus 로고    scopus 로고
    • Translating privacy practices into privacy promises - How to promise what you can keep
    • IEEE, Los Alamitos
    • Karjoth, G., et al.: Translating privacy practices into privacy promises - how to promise what you can keep. In: POLICY 2003. IEEE, Los Alamitos (2003)
    • (2003) POLICY 2003
    • Karjoth, G.1
  • 8
    • 71749093343 scopus 로고    scopus 로고
    • Towards automated security policy enforcement in multi-tenant virtual data centers
    • Cabuk, S., et al.: Towards automated security policy enforcement in multi-tenant virtual data centers. Journal of Computer Security 18, 89-121 (2010)
    • (2010) Journal of Computer Security , vol.18 , pp. 89-121
    • Cabuk, S.1
  • 9
    • 33845546728 scopus 로고    scopus 로고
    • Countering terrorism through information and privacy protection technologies
    • Popp, R., Poindexter, J.: Countering terrorism through information and privacy protection technologies. IEEE Security & Privacy 4, 24-33 (2006)
    • (2006) IEEE Security & Privacy , vol.4 , pp. 24-33
    • Popp, R.1    Poindexter, J.2
  • 10
    • 80054067302 scopus 로고    scopus 로고
    • Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies
    • Popp, L.R., Yen, J. (eds.) Wiley, Chichester
    • Kettler, B., et al.: Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies. In: Popp, L.R., Yen, J. (eds.) Emergent Information Technologies and Enabling Policies for Counter-Terrorism, pp. 175-195. Wiley, Chichester (2005)
    • (2005) Emergent Information Technologies and Enabling Policies for Counter-Terrorism , pp. 175-195
    • Kettler, B.1
  • 11
    • 78650358387 scopus 로고    scopus 로고
    • Interagency data exchange protocols as computational data protection law
    • IOS Press, Amsterdam
    • Buchanan, W., et al.: Interagency data exchange protocols as computational data protection law. In: Legal Knowledge and Information Systems - JURIX, pp. 143-146. IOS Press, Amsterdam (2010)
    • (2010) Legal Knowledge and Information Systems - JURIX , pp. 143-146
    • Buchanan, W.1
  • 13
    • 35148839490 scopus 로고
    • A translation approach to portable ontology specifications
    • Gruber, T.R.: A translation approach to portable ontology specifications. Knowledge Acquisition 5 (1993)
    • (1993) Knowledge Acquisition , pp. 5
    • Gruber, T.R.1
  • 14
    • 33750703611 scopus 로고    scopus 로고
    • Using semantic web technologies for policy management on the web
    • AAAI, Menlo Park
    • Kagal, L., et al.: Using semantic web technologies for policy management on the web. In: 21st National Conference on Artificial Intelligence (AAAI). AAAI, Menlo Park (2006)
    • (2006) 21st National Conference on Artificial Intelligence (AAAI)
    • Kagal, L.1
  • 15
    • 0242308055 scopus 로고    scopus 로고
    • Semantic web languages for policy representation and reasoning: A comparison of kAoS, Rei, and Ponder
    • Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. Springer, Heidelberg
    • Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic web languages for policy representation and reasoning: A comparison of kAoS, Rei, and Ponder. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 419-437. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2870 , pp. 419-437
    • Tonti, G.1    Bradshaw, J.M.2    Jeffers, R.3    Montanari, R.4    Suri, N.5    Uszok, A.6
  • 17
  • 18
    • 77954983075 scopus 로고    scopus 로고
    • Security for the cloud infrastructure: Trusted virtual data center implementation
    • Berger, S., et al.: Security for the cloud infrastructure: Trusted virtual data center implementation. IBM Journal of Research and Development, 6:1-6:12 (2009)
    • (2009) IBM Journal of Research and Development
    • Berger, S.1
  • 19
    • 34748816024 scopus 로고    scopus 로고
    • Privacy-preserving data integration and sharing
    • ACM, New York
    • Clifton, C., et al.: Privacy-preserving data integration and sharing. In: Data Mining and Knowledge Discovery, pp. 19-26. ACM, New York (2004)
    • (2004) Data Mining and Knowledge Discovery , pp. 19-26
    • Clifton, C.1
  • 20
    • 17244382960 scopus 로고    scopus 로고
    • Data integration: A logic-based perspective
    • Calvanese, D., Giacomo, G.D.: Data integration: A logic-based perspective. AI Magazine 26, 59-70 (2005)
    • (2005) AI Magazine , vol.26 , pp. 59-70
    • Calvanese, D.1    Giacomo, G.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.