메뉴 건너뛰기




Volumn , Issue , 2011, Pages 151-162

Policy auditing over incomplete logs: Theory, implementation and applications

Author keywords

Audit; Formal logic; Incomplete logs; Privacy policy

Indexed keywords

AUDIT; AUDIT LOGS; COMPLIANCE CHECKING; DATABASE INDEXING; FIRST ORDER LOGIC; INCOMPLETE LOGS; INFINITE DOMAINS; PERSONAL INFORMATION; PRIVACY AND SECURITY; PRIVACY POLICY; PRIVACY RULE; SPACE COMPLEXITY; SYNTACTIC STRUCTURE;

EID: 80755168369     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046726     Document Type: Conference Paper
Times cited : (73)

References (34)
  • 1
    • 0028202370 scopus 로고
    • A really temporal logic
    • R. Alur and T. A. Henzinger. A really temporal logic. Journal of the ACM, 41(1):181-203, 1994.
    • (1994) Journal of the ACM , vol.41 , Issue.1 , pp. 181-203
    • Alur, R.1    Henzinger, T.A.2
  • 2
    • 0001588190 scopus 로고
    • Reasoning about prolog programs: From modes through types to assertions
    • K. R. Apt and E. Marchiori. Reasoning about Prolog programs: From modes through types to assertions. Formal Aspects of Computing, 6(6):743-765, 1994.
    • (1994) Formal Aspects of Computing , vol.6 , Issue.6 , pp. 743-765
    • Apt, K.R.1    Marchiori, E.2
  • 5
    • 84944202148 scopus 로고    scopus 로고
    • Rule-Based Runtime Verification
    • Verification, Model Checking, and Abstract Interpretation
    • H. Barringer, A. Goldberg, K. Havelund, and K. Sen. Rule-based runtime verification. In Proceedings of the 5th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI), pages 44-57, 2004. (Pubitemid 38131366)
    • (2003) Lecture Notes in Computer Science , Issue.2937 , pp. 44-57
    • Barringer, H.1    Goldberg, A.2    Havelund, K.3    Sen, K.4
  • 6
    • 33751063543 scopus 로고    scopus 로고
    • Privacy and contextual integrity: Framework and applications
    • DOI 10.1109/SP.2006.32, 1624011, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum. Privacy and contextual integrity: Framework and applications. In Proceedings of the 27th IEEE Symposium on Security and Privacy (Oakland), pages 184-198, 2006. (Pubitemid 44753722)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 184-198
    • Barth, A.1    Datta, A.2    Mitchell, J.C.3    Nissenbaum, H.4
  • 14
    • 80755145272 scopus 로고    scopus 로고
    • HIPAA privacy rule accounting of disclosures under the health information technology for economic and clinical health act
    • Department of Health and Human Services, Office of the Secretary
    • Department of Health and Human Services, Office of the Secretary. HIPAA Privacy Rule accounting of disclosures under the health information technology for economic and clinical health act. 45 CFR 164, 2011. Available at http://www.gpo.gov/fdsys/pkg/FR-2011-05-31/pdf/2011-13297.pdf.
    • (2011) CFR 16445
  • 19
    • 26844464768 scopus 로고    scopus 로고
    • Model checking vs. generalized model checking: Semantic minimizations for temporal logics
    • Proceedings - 20th Annual IEEE symposium on Logic in Computer Science, LICS 2005
    • P. Godefroid and M. Huth. Model checking vs. generalized model checking: Semantic minimizations for temporal logics. In Proceedings of the 20th Annual IEEE Symposium on Logic in Computer Science (LICS), pages 158-167, 2005. (Pubitemid 41462563)
    • (2005) Proceedings - Symposium on Logic in Computer Science , pp. 158-167
    • Godefroid, P.1    Huth, M.2
  • 21
  • 23
    • 34247861351 scopus 로고    scopus 로고
    • A static compliance-checking framework for business process models
    • DOI 10.1147/sj.462.0335
    • Y. Liu, S. Müller, and K. Xu. A static compliance-checking framework for business process models. IBM Systems Journal, 46:335-361, 2007. (Pubitemid 46915268)
    • (2007) IBM Systems Journal , vol.46 , Issue.2 , pp. 335-361
    • Liu, Y.1    Muller, S.2    Xu, K.3
  • 25
    • 33947620690 scopus 로고    scopus 로고
    • Privacy APIs: Access control techniques to analyze and verify legal privacy policies
    • DOI 10.1109/CSFW.2006.24, 1648710, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
    • M. J. May, C. A. Gunter, and I. Lee. Privacy APIs: Access control techniques to analyze and verify legal privacy policies. In Proceedings of the 19th IEEE Workshop on Computer Security Foundations (CSFW), pages 85-97, 2006. (Pubitemid 46499719)
    • (2006) Proceedings of the Computer Security Foundations Workshop , vol.2006 , pp. 85-97
    • May, M.J.1    Gunter, C.A.2    Lee, I.3
  • 29
    • 17444417374 scopus 로고    scopus 로고
    • Rewriting-based techniques for runtime verification
    • DOI 10.1007/s10515-005-6205-y
    • G. Roşu and K. Havelund. Rewriting-based techniques for runtime verification. Automated Software Engineering, 12:151-197, 2005. (Pubitemid 40537733)
    • (2005) Automated Software Engineering , vol.12 , Issue.2 , pp. 151-197
    • Rosu, G.1    Havelund, K.2
  • 32
    • 11344251138 scopus 로고    scopus 로고
    • Monitoring Algorithms for Metric Temporal Logic Specifications
    • DOI 10.1016/j.entcs.2004.01.029, PII S1571066104052570
    • P. Thati and G. Roşu. Monitoring algorithms for metric temporal logic specifications. Electronic Notes in Theoretical Computer Science, 113:145-162, 2005. (Pubitemid 40073310)
    • (2005) Electronic Notes in Theoretical Computer Science , vol.113 , Issue.SPEC. ISS. , pp. 145-162
    • Thati, P.1    Rou, G.2
  • 33
    • 80755145271 scopus 로고    scopus 로고
    • US Congress 15 USC §6801-§6809, November
    • US Congress. Gramm-Leach-Bliley Act, Financial Privacy Rule. 15 USC §6801-§6809, November 1999. Available at http://www.law.cornell.edu/ uscode/usc-sup-01-15-10-94-20-I.html.
    • (1999) Gramm-leach-bliley Act, Financial Privacy Rule
  • 34
    • 80755188495 scopus 로고    scopus 로고
    • Health insurance portability and accountability act of 1996, privacy rule
    • US Congress
    • US Congress. Health Insurance Portability and Accountability Act of 1996, Privacy Rule. 45 CFR 164, 2002. Available at http://www.access.gpo.gov/nara/ cfr/waisidx-07/45cfr164-07.html.
    • (2002) 45 CFR 164


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.