-
1
-
-
0347015653
-
-
Senate banking committee Public Law 106-102
-
Senate banking committee, Gramm-Leach-Bliley Act, 1999. Public Law 106-102.
-
(1999)
Gramm-leach-bliley Act
-
-
-
2
-
-
77951543455
-
Obligation language and framework to enable privacy-aware SOA
-
Springer Berlin, Heidelberg
-
M. Ali, L. Bussard, and U. Pinsdorf. Obligation Language and Framework to Enable Privacy-Aware SOA. In Data Privacy Management and Autonomous Spontaneous Security, volume 5939 of Lecture Notes in Computer Science, pages 18-32. Springer Berlin, Heidelberg, 2010.
-
(2010)
Data Privacy Management and Autonomous Spontaneous Security, Volume 5939 of Lecture Notes in Computer Science
, pp. 18-32
-
-
Ali, M.1
Bussard, L.2
Pinsdorf, U.3
-
3
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
DOI 10.1109/SP.2006.32, 1624011, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum. Privacy and contextual integrity: Framework and applications. Security and Privacy, IEEE Symposium on, 0:184-198, 2006. (Pubitemid 44753722)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
4
-
-
0345829056
-
Provisions and obligations in policy rule management
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy rule management. J. Netw. Syst. Manage., 11(3):351-372, 2003.
-
(2003)
J. Netw. Syst. Manage.
, vol.11
, Issue.3
, pp. 351-372
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
5
-
-
84864072996
-
Ensuring authorization privileges for cascading user obligations
-
O. Chowdhury, M. Pontual, W. H. Winsborough, T. Yu, K. Irwin, and J. Niu. Ensuring authorization privileges for cascading user obligations. Technical Report CS-TR-2012-005, UT San Antonio, 2012.
-
(2012)
Technical Report CS-TR-2012-005, UT San Antonio
-
-
Chowdhury, O.1
Pontual, M.2
Winsborough, W.H.3
Yu, T.4
Irwin, K.5
Niu, J.6
-
6
-
-
84944048132
-
The ponder policy specification language
-
Bristol, UK, Jan. Springer-Verlag
-
D. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In 2nd International Workshop on Policies for Distributed Systems and Networks, Bristol, UK, Jan. 2001. Springer-Verlag.
-
(2001)
2nd International Workshop on Policies for Distributed Systems and Networks
-
-
Damianou, D.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
7
-
-
38049083819
-
Obligations and their interaction with programs
-
Dresden, Germany, September 24-26, Proceedings
-
D. J. Dougherty, K. Fisler, and S. Krishnamurthi. Obligations and their interaction with programs. In Proceedings of the 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, Proceedings, pages 375-389, 2007.
-
(2007)
Proceedings of the 12th European Symposium on Research in Computer Security
, pp. 375-389
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
8
-
-
80455143726
-
Formal enforcement and management of obligation policies
-
Jan.
-
Y. Elrakaiby, F. Cuppens, and N. Cuppens-Boulahia. Formal enforcement and management of obligation policies. Data Knowl. Eng., 71:127-147, Jan. 2012.
-
(2012)
Data Knowl. Eng.
, vol.71
, pp. 127-147
-
-
Elrakaiby, Y.1
Cuppens, F.2
Cuppens-Boulahia, N.3
-
9
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Aug.
-
D. F. Ferraiolo, R. S. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Transactions on Information and Systems Security, pages 224-274, Aug. 2001.
-
(2001)
ACM Transactions on Information and Systems Security
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
11
-
-
0005858785
-
-
Health Resources and Services Administration Public Law 104-191
-
Health Resources and Services Administration. Health insurance portability and accountability act, 1996. Public Law 104-191.
-
(1996)
Health Insurance Portability and Accountability Act
-
-
-
12
-
-
34547346853
-
On the modeling and analysis of obligations
-
DOI 10.1145/1180405.1180423, 1180423, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
K. Irwin, T. Yu, and W. H. Winsborough. On the modeling and analysis of obligations. In Proceedings of the 13th ACM conference on Computer and communications security, pages 134-143, New York, NY, USA, 2006. ACM. (Pubitemid 47131363)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 134-143
-
-
Irwin, K.1
Yu, T.2
Winsborough, W.H.3
-
13
-
-
84864061381
-
On the relationship between permission and obligation
-
New York, NY, USA. ACM
-
A. J. I. Jones. On the relationship between permission and obligation. In ICAIL '87, New York, NY, USA. ACM.
-
ICAIL '87
-
-
Jones, A.J.I.1
-
15
-
-
33947620690
-
Privacy APIs: Access control techniques to analyze and verify legal privacy policies
-
Washington, DC, USA IEEE Computer Society
-
M. J. May, C. A. Gunter, and I. Lee. Privacy APIs: Access control techniques to analyze and verify legal privacy policies. In CSFW '06, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
CSFW '06
-
-
May, M.J.1
Gunter, C.A.2
Lee, I.3
-
17
-
-
0022334918
-
Ensuring integrity by adding obligations to privileges
-
Los Alamitos, CA, USA IEEE Computer Society Press
-
N. H. Minsky and A. D. Lockman. Ensuring integrity by adding obligations to privileges. In Proceedings of the 8th international conference on Software engineering, pages 92-102, Los Alamitos, CA, USA, 1985. IEEE Computer Society Press.
-
(1985)
Proceedings of the 8th International Conference on Software Engineering
, pp. 92-102
-
-
Minsky, N.H.1
Lockman, A.D.2
-
18
-
-
57349158498
-
An obligation model bridging access control policies and privacy policies
-
New York, NY, USA. ACM
-
Q. Ni, E. Bertino, and J. Lobo. An obligation model bridging access control policies and privacy policies. In SACMAT' 08, New York, NY, USA. ACM.
-
SACMAT' 08
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
19
-
-
34548016110
-
Privacy-aware role based access control
-
New York, NY, USA. ACM
-
Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacy-aware role based access control. In Proceedings of the SACMAT'07, New York, NY, USA. ACM.
-
Proceedings of the SACMAT'07
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
20
-
-
77954470017
-
Toward practical authorization dependent user obligation systems
-
ACM Press
-
M. Pontual, O. Chowdhury, W. Winsborough, T. Yu, and K. Irwin. Toward Practical Authorization Dependent User Obligation Systems. In ASIACCS' 10, pages 180-191. ACM Press, 2010.
-
(2010)
ASIACCS' 10
, pp. 180-191
-
-
Pontual, M.1
Chowdhury, O.2
Winsborough, W.3
Yu, T.4
Irwin, K.5
-
21
-
-
79960179819
-
On the management of user obligations
-
New York, NY, USA. ACM
-
M. Pontual, O. Chowdhury, W. H. Winsborough, T. Yu, and K. Irwin. On the management of user obligations. SACMAT '11, New York, NY, USA. ACM.
-
SACMAT '11
-
-
Pontual, M.1
Chowdhury, O.2
Winsborough, W.H.3
Yu, T.4
Irwin, K.5
-
22
-
-
0001549660
-
The ARBAC97 model for role-based aministration of roles
-
Feb.
-
R. S. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based aministration of roles. ACM Transactions on Information and Systems Security, 2(1):105-135, Feb. 1999.
-
(1999)
ACM Transactions on Information and Systems Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
23
-
-
33947695249
-
Policy analysis for administrative role based access control
-
19th IEEE
-
A. Sasturkar, P. Yang, S. Stoller, and C. Ramakrishnan. Policy analysis for administrative role based access control. In Computer Security Foundations Workshop, 2006. 19th IEEE, 2006.
-
(2006)
Computer Security Foundations Workshop, 2006
-
-
Sasturkar, A.1
Yang, P.2
Stoller, S.3
Ramakrishnan, C.4
-
24
-
-
77952403780
-
Efficient policy analysis for administrative role based access control
-
New York, NY, USA ACM
-
S. D. Stoller, P. Yang, C. R. Ramakrishnan, and M. I. Gofman. Efficient policy analysis for administrative role based access control. In CCS '07, New York, NY, USA, 2007. ACM.
-
(2007)
CCS '07
-
-
Stoller, S.D.1
Yang, P.2
Ramakrishnan, C.R.3
Gofman, M.I.4
-
25
-
-
37149051976
-
Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement
-
Washington, DC, USA IEEE Computer Society
-
A. Uszok, J. Bradshaw, R. Jeffers, N. Suri, P. Hayes, M. Breedy, L. Bunch, M. Johnson, S. Kulkarni, and J. Lott. Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In POLICY '03, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
POLICY '03
-
-
Uszok, A.1
Bradshaw, J.2
Jeffers, R.3
Suri, N.4
Hayes, P.5
Breedy, M.6
Bunch, L.7
Johnson, M.8
Kulkarni, S.9
Lott, J.10
|