-
4
-
-
27644498532
-
Enabling shared audit data
-
DOI 10.1007/s10207-004-0061-9
-
A. Baldwin and S. Shiu, "Enabling Shared Audit Data," Int'l J. Information Security, vol. 4, no. 4, pp. 263-276, 2005. (Pubitemid 41554601)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.4
, pp. 263-276
-
-
Baldwin, A.1
Shiu, S.2
-
6
-
-
34748883672
-
On parametric obligation policies: Enabling privacy-aware information lifecycle management in enterprises
-
DOI 10.1109/POLICY.2007.30, 4262570, Proceedings - Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007
-
M.C. Mont and F. Beato, "On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises," Proc. IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '07), pp. 51-55, 2007. (Pubitemid 47469544)
-
(2007)
Proceedings - Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007
, pp. 51-55
-
-
Mont, M.C.1
Beato, F.2
-
7
-
-
33846573849
-
Selective Data Encryption in Outsourced Dynamic Environments
-
DOI 10.1016/j.entcs.2006.11.003, PII S1571066107000321
-
E. Damiani et al., "Selective Data Encryption in Outsourced Dynamic Environments," Electronic Notes in Theoretical Computer Science, vol. 168, pp. 127-142, 2007. (Pubitemid 46186187)
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.168
, Issue.SPEC. ISS.
, pp. 127-142
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
11
-
-
81455131396
-
Internet evolution-cloud control
-
Jan.
-
M. Fratto, "Internet Evolution-Cloud Control," Information Week, Jan. 2009.
-
(2009)
Information Week
-
-
Fratto, M.1
-
12
-
-
81455148627
-
A survey of web services security
-
C. Gutiérrez, E. Fernández-Medina, and M. Piattini, "A Survey of Web Services Security," Proc. Int'l Conf. Computational Science and Its Applications (ICCSA '04), vol. 1, 2004.
-
(2004)
Proc. Int'l Conf. Computational Science and Its Applications (ICCSA '04)
, vol.1
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
14
-
-
0023365727
-
Statecharts: A visual formalism for complex systems
-
DOI 10.1016/0167-6423(87)90035-9
-
D. Harel, "Statecharts: A Visual Formalism for Complex Systems," Science of Computer Programming, vol. 8, no. 3, pp. 231-274, June 1987. (Pubitemid 17617706)
-
(1987)
Science of Computer Programming
, vol.8
, Issue.3
, pp. 231-274
-
-
Harel David1
-
15
-
-
81455141176
-
-
Hibernate, http://www.hibernate.org, 2011.
-
(2011)
Hibernate
-
-
-
16
-
-
74549207114
-
-
U.S. Department of Health & Human Services
-
U.S. Department of Health & Human Services, "Health Information Privacy," http://www.hhs.gov/ocr/privacy/index.html, 2011.
-
(2011)
Health Information Privacy
-
-
-
18
-
-
81455141182
-
-
Keynote Systems, http://www.keynote.com, 2011.
-
(2011)
Keynote Systems
-
-
-
19
-
-
47649106491
-
Electronic contracts
-
July/Aug.
-
P. Krishna and K. Karlapalem, "Electronic Contracts," IEEE Internet Computing, vol. 12, no. 4, pp. 60-68, July/Aug. 2008.
-
(2008)
IEEE Internet Computing
, vol.12
, Issue.4
, pp. 60-68
-
-
Krishna, P.1
Karlapalem, K.2
-
20
-
-
79952389930
-
A data assurance policy specification and enforcement framework for outsourced services
-
J. Li et al., "A Data Assurance Policy Specification and Enforcement Framework for Outsourced Services," Technical Report HPL 2009-357, 2009.
-
(2009)
Technical Report HPL 2009-357
-
-
Li, J.1
-
22
-
-
66149156552
-
Cloud computing
-
May
-
R.W. Lucky, "Cloud Computing," IEEE Spectrum, vol. 46, no. 5, p. 27, May 2009.
-
(2009)
IEEE Spectrum
, vol.46
, Issue.5
, pp. 27
-
-
Lucky, R.W.1
-
26
-
-
81455154260
-
OASIS
-
OASIS, WS-BPEL 2.0, 2007.
-
(2007)
WS-BPEL 2.0
-
-
-
27
-
-
81455154255
-
-
OASIS Version 2.0 Feb.
-
OASIS, XACML, Version 2.0, Feb. 2005.
-
(2005)
XACML
-
-
-
28
-
-
73149093583
-
-
OASIS 1. 2, July
-
OASIS, WS-SecurityPolicy 1.2, July 2007.
-
(2007)
WS-SecurityPolicy
-
-
-
30
-
-
3142523603
-
-
ACM Trans. Information and Systems Security
-
J. Park and R. Sandhu, "The UCON ABC Usage Control Model," ACM Trans. Information and Systems Security, vol. 7, pp. 128-174, 2004.
-
(2004)
The UCON ABC usage control model
, vol.7
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
32
-
-
81455158667
-
Quality-driven business policy specification and refinement for service-oriented systems
-
T. Phan et al., "Quality-Driven Business Policy Specification and Refinement for Service-Oriented Systems," Proc. Int'l Conf. Service-Oriented Computing (ICSOC '08), 2008.
-
(2008)
Proc. Int'l Conf. Service-Oriented Computing (ICSOC '08)
-
-
Phan, T.1
-
33
-
-
33748543201
-
Distributed usage control
-
DOI 10.1145/1151030.1151053, Privacy and Security in Highly Dynamic Systems
-
A. Pretschner, M. Hilty, and D. Basin, "Distributed Usage Control," Comm. ACM, vol. 49, no. 9, pp. 39-44, Sept. 2006. (Pubitemid 44371759)
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
34
-
-
81455141180
-
-
PRIME Project, https://www.prime-project.eu, 2011.
-
(2011)
PRIME Project
-
-
-
35
-
-
81455158666
-
-
Rackspace
-
Rackspace, "Intrusion Detection Systems (IDS)," http://www. rackspace.com/downloads/pdfs/IDSOverview.pdf, 2011.
-
(2011)
Intrusion Detection Systems (IDS)
-
-
-
36
-
-
0002101577
-
Reputation systems: Facilitating trust in internet interactions
-
P. Resnick et al., "Reputation Systems: Facilitating Trust in Internet Interactions," Comm. ACM, vol. 43, no. 12, pp. 45-48, 2000.
-
(2000)
Comm. ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
-
38
-
-
81455158668
-
-
Safe Harbor, http://www.export.gov/safeharbor/index.asp, 2011.
-
(2011)
Safe Harbor
-
-
-
41
-
-
62349128024
-
-
NIST Special Publication Aug.
-
A. Singhal, T. Winograd, and K. Scarfone, "Guide to Secure Web Services: Recommendations of the National Institute of Standards and Technology," pp. 800-95, NIST Special Publication, Aug. 2007.
-
(2007)
Guide to Secure Web Services: Recommendations of the National Institute of Standards and Technology
, pp. 800-895
-
-
Singhal, A.1
Winograd, T.2
Scarfone, K.3
-
42
-
-
19944408999
-
Trust-serv: Model-driven lifecycle management of trust negotiation policies for web services
-
H. Skogsrud et al., "Trust-Serv: Model-Driven Lifecycle Management of Trust Negotiation Policies for Web Services," Proc. Int'l Conf. World Wide Web (WWW '04), 2004.
-
(2004)
Proc. Int'l Conf. World Wide Web (WWW '04)
-
-
Skogsrud, H.1
-
48
-
-
84997556980
-
Integrity auditing of outsourced data
-
M. Xie, H. Wang, J. Yin, and X. Meng, "Integrity Auditing of Outsourced Data," Proc. Int'l Conf. Very Large Data Bases (VLDB '07), pp. 782-793, 2007.
-
(2007)
Proc. Int'l Conf. Very Large Data Bases (VLDB '07)
, pp. 782-793
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
|