-
1
-
-
0028202370
-
A really temporal logic
-
R. Alur and T. A. Henzinger. A really temporal logic. Journal of the ACM, 41(1):181-203, 1994.
-
(1994)
Journal of the ACM
, vol.41
, Issue.1
, pp. 181-203
-
-
Alur, R.1
Henzinger, T.A.2
-
2
-
-
0001588190
-
Reasoning about prolog programs: From modes through types to assertions
-
K. R. Apt and E. Marchiori. Reasoning about Prolog programs: From modes through types to assertions. Formal Aspects of Computing, 6(6):743-765, 1994.
-
(1994)
Formal Aspects of Computing
, vol.6
, Issue.6
, pp. 743-765
-
-
Apt, K.R.1
Marchiori, E.2
-
5
-
-
84944202148
-
Rule-Based Runtime Verification
-
Verification, Model Checking, and Abstract Interpretation
-
H. Barringer, A. Goldberg, K. Havelund, and K. Sen. Rule-based runtime verification. In Proceedings of the 5th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI), pages 44-57, 2004. (Pubitemid 38131366)
-
(2003)
Lecture Notes in Computer Science
, Issue.2937
, pp. 44-57
-
-
Barringer, H.1
Goldberg, A.2
Havelund, K.3
Sen, K.4
-
6
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
DOI 10.1109/SP.2006.32, 1624011, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum. Privacy and contextual integrity: Framework and applications. In Proceedings of the 27th IEEE Symposium on Security and Privacy (Oakland), pages 184-198, 2006. (Pubitemid 44753722)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
7
-
-
35048898814
-
Privacy and utility in business processes
-
A. Barth, J. C. Mitchell, A. Datta, and S. Sundaram. Privacy and utility in business processes. In Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF), pages 279-294, 2007.
-
(2007)
Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF)
, pp. 279-294
-
-
Barth, A.1
Mitchell, J.C.2
Datta, A.3
Sundaram, S.4
-
10
-
-
0345829056
-
Provisions and obligations in policy rule management
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy rule management. Journal of Network and Systems Management, 11:351-372, 2003.
-
(2003)
Journal of Network and Systems Management
, vol.11
, pp. 351-372
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
12
-
-
33947670402
-
Audit-based compliance control
-
DOI 10.1007/s10207-007-0017-y
-
J. G. Cederquist, R. Corin, M. A. C. Dekker, S. Etalle, J. I. den Hartog, and G. Lenzini. Audit-based compliance control. International Journal of Information Security, 6(2):133-151, 2007. (Pubitemid 46487967)
-
(2007)
International Journal of Information Security
, vol.6
, Issue.2-3
, pp. 133-151
-
-
Cederquist, J.G.1
Corin, R.2
Dekker, M.A.C.3
Etalle, S.4
Den Hartog, J.I.5
Lenzini, G.6
-
14
-
-
80755145272
-
HIPAA privacy rule accounting of disclosures under the health information technology for economic and clinical health act
-
Department of Health and Human Services, Office of the Secretary
-
Department of Health and Human Services, Office of the Secretary. HIPAA Privacy Rule accounting of disclosures under the health information technology for economic and clinical health act. 45 CFR 164, 2011. Available at http://www.gpo.gov/fdsys/pkg/FR-2011-05-31/pdf/2011-13297.pdf.
-
(2011)
CFR 16445
-
-
-
15
-
-
78650209519
-
Experiences in the logical specification of the HIPAA and GLBA privacy laws
-
Full version: Carnegie Mellon University Technical Report CMU-CyLab-10-007
-
H. DeYoung, D. Garg, L. Jia, D. Kaynar, and A. Datta. Experiences in the logical specification of the HIPAA and GLBA privacy laws. In Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society (WPES), 2010. Full version: Carnegie Mellon University Technical Report CMU-CyLab-10-007.
-
(2010)
Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society (WPES)
-
-
Deyoung, H.1
Garg, D.2
Jia, L.3
Kaynar, D.4
Datta, A.5
-
18
-
-
84944105044
-
Regulations expressed as logical models (REALM)
-
C. Giblin, A. Y. Liu, S. Müller, B. Pfitzmann, and X. Zhou. Regulations expressed as logical models (REALM). In Proceeding of the 18th Annual Conference on Legal Knowledge and Information Systems (JURIX), pages 37-48, 2005.
-
(2005)
Proceeding of the 18th Annual Conference on Legal Knowledge and Information Systems (JURIX)
, pp. 37-48
-
-
Giblin, C.1
Liu, A.Y.2
Müller, S.3
Pfitzmann, B.4
Zhou, X.5
-
19
-
-
26844464768
-
Model checking vs. generalized model checking: Semantic minimizations for temporal logics
-
Proceedings - 20th Annual IEEE symposium on Logic in Computer Science, LICS 2005
-
P. Godefroid and M. Huth. Model checking vs. generalized model checking: Semantic minimizations for temporal logics. In Proceedings of the 20th Annual IEEE Symposium on Logic in Computer Science (LICS), pages 158-167, 2005. (Pubitemid 41462563)
-
(2005)
Proceedings - Symposium on Logic in Computer Science
, pp. 158-167
-
-
Godefroid, P.1
Huth, M.2
-
21
-
-
34547346853
-
On the modeling and analysis of obligations
-
DOI 10.1145/1180405.1180423, 1180423, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
K. Irwin, T. Yu, and W. H. Winsborough. On the modeling and analysis of obligations. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), pages 134-143, 2006. (Pubitemid 47131363)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 134-143
-
-
Irwin, K.1
Yu, T.2
Winsborough, W.H.3
-
22
-
-
70350600124
-
A formalization of HIPAA for a medical messaging system
-
P. E. Lam, J. C. Mitchell, and S. Sundaram. A formalization of HIPAA for a medical messaging system. In Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus), pages 73-85, 2009.
-
(2009)
Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus)
, pp. 73-85
-
-
Lam, P.E.1
Mitchell, J.C.2
Sundaram, S.3
-
23
-
-
34247861351
-
A static compliance-checking framework for business process models
-
DOI 10.1147/sj.462.0335
-
Y. Liu, S. Müller, and K. Xu. A static compliance-checking framework for business process models. IBM Systems Journal, 46:335-361, 2007. (Pubitemid 46915268)
-
(2007)
IBM Systems Journal
, vol.46
, Issue.2
, pp. 335-361
-
-
Liu, Y.1
Muller, S.2
Xu, K.3
-
25
-
-
33947620690
-
Privacy APIs: Access control techniques to analyze and verify legal privacy policies
-
DOI 10.1109/CSFW.2006.24, 1648710, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
-
M. J. May, C. A. Gunter, and I. Lee. Privacy APIs: Access control techniques to analyze and verify legal privacy policies. In Proceedings of the 19th IEEE Workshop on Computer Security Foundations (CSFW), pages 85-97, 2006. (Pubitemid 46499719)
-
(2006)
Proceedings of the Computer Security Foundations Workshop
, vol.2006
, pp. 85-97
-
-
May, M.J.1
Gunter, C.A.2
Lee, I.3
-
29
-
-
17444417374
-
Rewriting-based techniques for runtime verification
-
DOI 10.1007/s10515-005-6205-y
-
G. Roşu and K. Havelund. Rewriting-based techniques for runtime verification. Automated Software Engineering, 12:151-197, 2005. (Pubitemid 40537733)
-
(2005)
Automated Software Engineering
, vol.12
, Issue.2
, pp. 151-197
-
-
Rosu, G.1
Havelund, K.2
-
31
-
-
33646578742
-
Run-Time Checking of Dynamic Properties
-
DOI 10.1016/j.entcs.2006.02.006, PII S1571066106003057
-
O. Sokolsky, U. Sammapun, I. Lee, and J. Kim. Run-time checking of dynamic properties. Electronic Notes in Theoretical Computer Science, 144:91-108, 2006. (Pubitemid 43728184)
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.144
, Issue.SPEC. ISS. 4
, pp. 91-108
-
-
Sokolsky, O.1
Sammapun, U.2
Lee, I.3
Kim, J.4
-
32
-
-
11344251138
-
Monitoring Algorithms for Metric Temporal Logic Specifications
-
DOI 10.1016/j.entcs.2004.01.029, PII S1571066104052570
-
P. Thati and G. Roşu. Monitoring algorithms for metric temporal logic specifications. Electronic Notes in Theoretical Computer Science, 113:145-162, 2005. (Pubitemid 40073310)
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.113
, Issue.SPEC. ISS.
, pp. 145-162
-
-
Thati, P.1
Rou, G.2
-
33
-
-
80755145271
-
-
US Congress 15 USC §6801-§6809, November
-
US Congress. Gramm-Leach-Bliley Act, Financial Privacy Rule. 15 USC §6801-§6809, November 1999. Available at http://www.law.cornell.edu/ uscode/usc-sup-01-15-10-94-20-I.html.
-
(1999)
Gramm-leach-bliley Act, Financial Privacy Rule
-
-
-
34
-
-
80755188495
-
Health insurance portability and accountability act of 1996, privacy rule
-
US Congress
-
US Congress. Health Insurance Portability and Accountability Act of 1996, Privacy Rule. 45 CFR 164, 2002. Available at http://www.access.gpo.gov/nara/ cfr/waisidx-07/45cfr164-07.html.
-
(2002)
45 CFR 164
-
-
|