-
2
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Takabi, H., et al.: Security and privacy challenges in cloud computing environments. IEEE Seurity & Privacy 8, 24-31 (2010)
-
(2010)
IEEE Seurity & Privacy
, vol.8
, pp. 24-31
-
-
Takabi, H.1
-
3
-
-
34547332566
-
A roadmap for comprehensive online for privacy policy management
-
Antón, I.A., et al.: A roadmap for comprehensive online for privacy policy management. Comm. of the ACM 50, 109-116 (2007)
-
(2007)
Comm. of the ACM
, vol.50
, pp. 109-116
-
-
Antón, I.A.1
-
5
-
-
48249091293
-
A privacy-aware access control system
-
Ardagna, A.C., et al.: A privacy-aware access control system. Journal of Computer Security 16, 369-397 (2008)
-
(2008)
Journal of Computer Security
, vol.16
, pp. 369-397
-
-
Ardagna, A.C.1
-
6
-
-
84893064260
-
Translating privacy practices into privacy promises - How to promise what you can keep
-
IEEE, Los Alamitos
-
Karjoth, G., et al.: Translating privacy practices into privacy promises - how to promise what you can keep. In: POLICY 2003. IEEE, Los Alamitos (2003)
-
(2003)
POLICY 2003
-
-
Karjoth, G.1
-
8
-
-
71749093343
-
Towards automated security policy enforcement in multi-tenant virtual data centers
-
Cabuk, S., et al.: Towards automated security policy enforcement in multi-tenant virtual data centers. Journal of Computer Security 18, 89-121 (2010)
-
(2010)
Journal of Computer Security
, vol.18
, pp. 89-121
-
-
Cabuk, S.1
-
9
-
-
33845546728
-
Countering terrorism through information and privacy protection technologies
-
Popp, R., Poindexter, J.: Countering terrorism through information and privacy protection technologies. IEEE Security & Privacy 4, 24-33 (2006)
-
(2006)
IEEE Security & Privacy
, vol.4
, pp. 24-33
-
-
Popp, R.1
Poindexter, J.2
-
10
-
-
80054067302
-
Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies
-
Popp, L.R., Yen, J. (eds.) Wiley, Chichester
-
Kettler, B., et al.: Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies. In: Popp, L.R., Yen, J. (eds.) Emergent Information Technologies and Enabling Policies for Counter-Terrorism, pp. 175-195. Wiley, Chichester (2005)
-
(2005)
Emergent Information Technologies and Enabling Policies for Counter-Terrorism
, pp. 175-195
-
-
Kettler, B.1
-
11
-
-
78650358387
-
Interagency data exchange protocols as computational data protection law
-
IOS Press, Amsterdam
-
Buchanan, W., et al.: Interagency data exchange protocols as computational data protection law. In: Legal Knowledge and Information Systems - JURIX, pp. 143-146. IOS Press, Amsterdam (2010)
-
(2010)
Legal Knowledge and Information Systems - JURIX
, pp. 143-146
-
-
Buchanan, W.1
-
12
-
-
70749108227
-
-
project deliverable D2, working group I2. Technical report, REWERSE
-
Bonatti, P., Olmedilla, D.: Policy language specification, enforcement, and integration. project deliverable D2, working group I2. Technical report, REWERSE (2005)
-
(2005)
Policy Language Specification, Enforcement, and Integration
-
-
Bonatti, P.1
Olmedilla, D.2
-
13
-
-
35148839490
-
A translation approach to portable ontology specifications
-
Gruber, T.R.: A translation approach to portable ontology specifications. Knowledge Acquisition 5 (1993)
-
(1993)
Knowledge Acquisition
, pp. 5
-
-
Gruber, T.R.1
-
14
-
-
33750703611
-
Using semantic web technologies for policy management on the web
-
AAAI, Menlo Park
-
Kagal, L., et al.: Using semantic web technologies for policy management on the web. In: 21st National Conference on Artificial Intelligence (AAAI). AAAI, Menlo Park (2006)
-
(2006)
21st National Conference on Artificial Intelligence (AAAI)
-
-
Kagal, L.1
-
15
-
-
0242308055
-
Semantic web languages for policy representation and reasoning: A comparison of kAoS, Rei, and Ponder
-
Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. Springer, Heidelberg
-
Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic web languages for policy representation and reasoning: A comparison of kAoS, Rei, and Ponder. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 419-437. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2870
, pp. 419-437
-
-
Tonti, G.1
Bradshaw, J.M.2
Jeffers, R.3
Montanari, R.4
Suri, N.5
Uszok, A.6
-
17
-
-
0343877448
-
Metapolicies I
-
Hosmer, H.H.: Metapolicies I. ACM SIGSAC Review 10, 18-43 (1992)
-
(1992)
ACM SIGSAC Review
, vol.10
, pp. 18-43
-
-
Hosmer, H.H.1
-
18
-
-
77954983075
-
Security for the cloud infrastructure: Trusted virtual data center implementation
-
Berger, S., et al.: Security for the cloud infrastructure: Trusted virtual data center implementation. IBM Journal of Research and Development, 6:1-6:12 (2009)
-
(2009)
IBM Journal of Research and Development
-
-
Berger, S.1
-
19
-
-
34748816024
-
Privacy-preserving data integration and sharing
-
ACM, New York
-
Clifton, C., et al.: Privacy-preserving data integration and sharing. In: Data Mining and Knowledge Discovery, pp. 19-26. ACM, New York (2004)
-
(2004)
Data Mining and Knowledge Discovery
, pp. 19-26
-
-
Clifton, C.1
-
20
-
-
17244382960
-
Data integration: A logic-based perspective
-
Calvanese, D., Giacomo, G.D.: Data integration: A logic-based perspective. AI Magazine 26, 59-70 (2005)
-
(2005)
AI Magazine
, vol.26
, pp. 59-70
-
-
Calvanese, D.1
Giacomo, G.D.2
|