-
1
-
-
0034315774
-
Security of the distributed electronic patient record: A case-based approach to identifying policy issues
-
Anderson, J., " Security of the distributed electronic patient record: a case-based approach to identifying policy issues", International Journal of Medical Informatics, vol. 60, no. 2, pages 11-118, 2000.
-
(2000)
International Journal of Medical Informatics
, vol.60
, Issue.2
, pp. 11-118
-
-
Anderson, J.1
-
3
-
-
30644474612
-
Purpose based access control of complex data for privacy protection
-
ACM. New York, NY, USA
-
Byun, J.-W., Bertino, E. and Li, N., "Purpose based access control of complex data for privacy protection", 'SACMAT'05: Proceedings of tenth ACM symposium on Access control models and technologies, ACM. New York, NY, USA, pp.102-110, 2005.
-
(2005)
SACMAT'05: Proceedings of Tenth ACM Symposium on Access Control Models and Technologies
, pp. 102-110
-
-
Byun, J.-W.1
Bertino, E.2
Li, N.3
-
4
-
-
85001817360
-
Health insurance portability and accountability act (HIPAA) compliant access control model for web services
-
Cheng, V. S. Y., Hung, P. C. K., "Health insurance portability and accountability act (HIPAA) compliant access control model for web services", International Journal of Healthcare information systems and Informatics, Vol I, Issue I, pp. 22-39, 2005
-
(2005)
International Journal of Healthcare Information Systems and Informatics
, vol.1
, Issue.1
, pp. 22-39
-
-
Cheng, V.S.Y.1
Hung, P.C.K.2
-
5
-
-
38349010641
-
A role and attribute based access control system using semantic web technologies
-
Cirio, L., Cruz, T. F., and Tamassia, R., "A role and attribute based access control system using semantic web technologies", Lecture Notes in Computer Science, Volume 4806/2007, pp. 1256-1266,2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4806
, Issue.2007
, pp. 1256-1266
-
-
Cirio, L.1
Cruz, T.F.2
Tamassia, R.3
-
6
-
-
84944405245
-
Extending policy languages to the semantic web
-
Munich, Germany
-
Damiani, E., De Capitani di Vimercati, S., Fugazza, C. and Samarati, P., "Extending policy languages to the semantic web", In Processings of the 4th International Conference on Web Engineering, Munich, Germany, pp. 330-343,2004.
-
(2004)
th International Conference on Web Engineering
, pp. 330-343
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Fugazza, C.3
Samarati, P.4
-
9
-
-
71749101660
-
Towards an approach of semantic access control for clouding Computing
-
Hu, L. K., Ying, S., Jia, X. Y. and Zhao, K., "Towards an approach of semantic access control for clouding Computing", Proceedings of the 1st International Conference on Cloud Computing, pp. 145-156,2009.
-
(2009)
Proceedings of the 1st International Conference on Cloud Computing
, pp. 145-156
-
-
Hu, L.K.1
Ying, S.2
Jia, X.Y.3
Zhao, K.4
-
10
-
-
11044225422
-
A policy based approach to security for the semantic Web
-
Springer-Verlag
-
Kagal, L., Finin, T. and Joshi, A., "A policy based approach to security for the semantic Web", 2nd International semantic web conference, ISWC'03, Springer-Verlag, 2003.
-
(2003)
2nd International Semantic Web Conference, ISWC'03
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
11
-
-
79957455283
-
Privacy-aware access control with trust management in web service
-
ISSN 1386-I45X
-
Li, M., Sun, X., Wang, H., Zhang, Y., and Zhang, J., "Privacy-aware access control with trust management in web service", World Wide Web, 14 (4). pp. 407-430. ISSN 1386-I45X.
-
World Wide Web
, vol.14
, Issue.4
, pp. 407-430
-
-
Li, M.1
Sun, X.2
Wang, H.3
Zhang, Y.4
Zhang, J.5
-
14
-
-
33748043984
-
Semantic access control for information interoperation
-
June
-
Pan, C. c., Mitra, P. and Liu, P., "Semantic access control for information interoperation", Proceedings of the eleventh ACM symposium on Access control models and technologies, June 2006, pp. 7-9.
-
(2006)
Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
, pp. 7-9
-
-
Pan, C.C.1
Mitra, P.2
Liu, P.3
-
15
-
-
84949513306
-
Security architectures for controlled digital information dissemination
-
December
-
Park, J., Sandhu, R., Schifalacqua, J., "Security architectures for controlled digital information dissemination", In Proceedings of 16'h Annual Computer Security Application Conference, December 2003.
-
(2003)
Proceedings of 16'h Annual Computer Security Application Conference
-
-
Park, J.1
Sandhu, R.2
Schifalacqua, J.3
-
16
-
-
62949114652
-
Supporting attribute-based access control in authorization and authentication infrastructures with ontologies
-
Priebe T., Dobmeier W. and Kamprath N., "Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies", Journal of Software, 2(1), pp. 27-38,2007.
-
(2007)
Journal of Software
, vol.2
, Issue.1
, pp. 27-38
-
-
Priebe, T.1
Dobmeier, W.2
Kamprath, N.3
-
17
-
-
63449110864
-
A novel use of RBAC to protect privacy in distributed health care information systems
-
July 9-11, 2003, Wollongong
-
Reid, J. F., Cheong, J., Henricksen, M. P. and Smith, J., "A novel use of RBAC to protect privacy in distributed health care information systems", In: 8th Australasian Conference on Information Security and Privacy (ACISP 2003), July 9-11, 2003, Wollongong.
-
(2003)
8th Australasian Conference on Information Security and Privacy (ACISP
-
-
Reid, J.F.1
Cheong, J.2
Henricksen, M.P.3
Smith, J.4
-
18
-
-
0030086382
-
Role-based access control models
-
Sandhu, R. S., Coyne, E. J., Feinstein, H. L. and Younman, C. E., "Role-based access control models", IEEE Compter, Vol. 29 No. 2, pp. 38-47, 1996.
-
(1996)
IEEE Compter
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Younman, C.E.4
-
20
-
-
84864270909
-
A purpose based usage access control model
-
Sun, L. and Wang, H., "A Purpose Based Usage Access Control Model", International Journal of Computer and Information Engineering, 4:1 2010,44-51.
-
(2010)
International Journal of Computer and Information Engineering
, vol.4
, Issue.1
, pp. 44-51
-
-
Sun, L.1
Wang, H.2
-
21
-
-
80053507368
-
Access control and authorization for protecting disseminative information in E-Iearning workflow
-
DOl: 10.1002/cpe.l748
-
Sun, L. and Wang, H., "Access control and authorization for protecting disseminative information in E-Iearning workflow", Concurrency and Computation: Practice and Experience, Vo1.23, pp.2034-2042, DOl: 10.1002/cpe.l748.
-
Concurrency and Computation: Practice and Experience
, vol.23
, pp. 2034-2042
-
-
Sun, L.1
Wang, H.2
-
22
-
-
52249110791
-
SBAC: A semantic based access control model
-
Javanmardi, S., Amini, M., Jalili, R. and Ganjisaffar, Y., "SBAC: A semantic based access control model", In Proceedings of the 11th Nordic Workshop on Secure IT -Systems Conference (NordSec06), pp. 157-168, 2006.
-
(2006)
Proceedings of the 11th Nordic Workshop on Secure IT -Systems Conference (NordSec06)
, pp. 157-168
-
-
Javanmardi, S.1
Amini, M.2
Jalili, R.3
Ganjisaffar, Y.4
-
23
-
-
84875851167
-
-
W3C Semantic Web http.//www.w3.orgi2001/sw/Activity/Activity Statement
-
W3C Semantic Web
-
-
-
24
-
-
46849089265
-
Access control management for ubiquitous computing
-
24
-
Wang, H., Cao, J., and Zhang, Y., "Access control management for ubiquitous computing", Future Generation Computer Systems journal. 870-878(24),2008.
-
(2008)
Future Generation Computer Systems Journal
, pp. 870-878
-
-
Wang, H.1
Cao, J.2
Zhang, Y.3
-
25
-
-
66149170246
-
Effective collaboration with information sharing in virtual universities
-
June
-
Wang, H., Zhang, Y. and Cao, J., "Effective collaboration with information sharing in virtual universities", IEEE Transactions on Knowledge and Data Engineering, Vol. 21, No. 6, pages: 840-853, June, 2009.
-
(2009)
IEEE Transactions on Knowledge and Data Engineering
, vol.21
, Issue.6
, pp. 840-853
-
-
Wang, H.1
Zhang, Y.2
Cao, J.3
-
26
-
-
14644433066
-
A flexible payment scheme and its role based access control
-
March
-
Wang, H., Cao, J., and Zhang, Y., "A flexible payment scheme and its role based access control", IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 17, No. 3, pages:425-436, March, 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering (TKDE)
, vol.17
, Issue.3
, pp. 425-436
-
-
Wang, H.1
Cao, J.2
Zhang, Y.3
-
27
-
-
67651163825
-
Delegating revocations and authorizations in collaborative business environments
-
Wang, H., Cao, 1., and Zhang, Y., "Delegating revocations and authorizations in collaborative business environments", Information Systems Frontiers, 11(3): 293-305,2009.
-
(2009)
Information Systems Frontiers
, vol.11
, Issue.3
, pp. 293-305
-
-
Wang, H.1
Cao, I.2
Zhang, Y.3
-
28
-
-
18844438093
-
A metadata-based access control model for web services
-
Yague, M. I., Mana, A. and Lopez, J., "A metadata-based access control model for web services", Internet research, Vol. 15 No. I, pp. 99-116, 2005.
-
(2005)
Internet Research
, vol.15
, Issue.1
, pp. 99-116
-
-
Yague, M.I.1
Mana, A.2
Lopez, J.3
|