-
1
-
-
0035570270
-
Privacy in context
-
Ackerman, M., Darrell, T., & Weitzner, D.J. (2001). Privacy in context. Human-Computer Interaction, 16, 167-176
-
(2001)
Human-Computer Interaction
, vol.16
, pp. 167-176
-
-
Ackerman, M.1
Darrell, T.2
Weitzner, D.J.3
-
5
-
-
0346685887
-
Analyzing information flow properties in assembly code by abstract interpretation
-
Barbuti, R., Bernardeschi, C., & De Francesco, N. (2004). Analyzing information flow properties in assembly code by abstract interpretation. The Computer Journal, 47(1), 25-45
-
(2004)
The Computer Journal
, vol.47
, Issue.1
, pp. 25-45
-
-
Barbuti, R.1
Bernardeschi, C.2
de Francesco, N.3
-
11
-
-
0003483795
-
-
December, Presentation at XML 2000, Washington, DC. Retrieved April 30, 2005, from
-
Berners-Lee, T. (2000, December). Semantic Web. Presentation at XML 2000, Washington, DC. Retrieved April 30, 2005, from http://www.w3.org/2000/Talks/1206-xml2k-tbl/slide10-0.html
-
(2000)
Semantic Web
-
-
Berners-Lee, T.1
-
15
-
-
13244267910
-
Design rationale of RuleML: A markup language for Semantic Web rules
-
July/August, Stanford, CA
-
Boley, H., Tabet, S., & Wagner, G. (2001). Design rationale of RuleML: A markup language for Semantic Web rules. Proceedings of SWWS'01, July/August, Stanford, CA.
-
(2001)
Proceedings of SWWS'01
-
-
Boley, H.1
Tabet, S.2
Wagner, G.3
-
16
-
-
84874324906
-
Identity based encryption from the Weil pairing
-
Boneh, D. & Franklin, M. (2001). Identity based encryption from the Weil pairing. Crypto 2001, LNCS 2139, 213-229.
-
(2001)
Crypto 2001, LNCS 2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
17
-
-
0000523051
-
A logic of authentication
-
Burrows, M., Abadi, M., & Needham, R. (1989). A logic of authentication. Proceedings of the Royal Society of London, LNCS 426 (pp. 233-271).
-
(1989)
Proceedings of the Royal Society of London, LNCS 426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
18
-
-
77957664813
-
On Jaskowski's discussive logic
-
In A.I. Arruda, N.C.A. da Costa, & R. Chuaqui (Eds.), Amsterdam, The Netherlands: North-Holland Publishing Company
-
da Costa, N.C.A., & Dubikajtis, L. (1977). On Jaskowski's discussive logic. In A.I. Arruda, N.C.A. da Costa, & R. Chuaqui (Eds.), Non-classical logics, modal theory and computability (pp. 37-56). Amsterdam, The Netherlands: North-Holland Publishing Company.
-
(1977)
Non-classical Logics, Modal Theory and Computability
, pp. 37-56
-
-
da Costa, N.C.A.1
Dubikajtis, L.2
-
19
-
-
0031359436
-
Rule based database access control: A practical approach
-
Didriksen, T. (1997). Rule based database access control: A practical approach. ACM Workshop on Role-Based Access Control, 143-151.
-
(1997)
ACM Workshop On Role-Based Access Control
, pp. 143-151
-
-
Didriksen, T.1
-
20
-
-
0007912444
-
Intuitive semantics for first degree entailment and coupled trees
-
Dunn, J.M. (1976). Intuitive semantics for first degree entailment and coupled trees. Philosophical Studies, XXIX, 149-68.
-
(1976)
Philosophical Studies, XXIX
, pp. 149-168
-
-
Dunn, J.M.1
-
22
-
-
0141911037
-
-
Norwood, MA: Artech House
-
Ferraiolo, D., Kuhn, D., & Chandramouli, R. (2003). Role-based access control. Norwood, MA: Artech House.
-
(2003)
Role-based Access Control
-
-
Ferraiolo, D.1
Kuhn, D.2
Chandramouli, R.3
-
24
-
-
84899236621
-
Reading between the lines: Using SHOE to discover implicit knowledge from the Web
-
Madison, WI
-
Heflin, J., Hendler, J., & Luke, S. (1988). Reading between the lines: Using SHOE to discover implicit knowledge from the Web. Proceedings of the AAAI-98 Workshop on AI and Information Integration, Madison, WI.
-
(1988)
Proceedings of the AAAI-98 Workshop On AI and Information Integration
-
-
Heflin, J.1
Hendler, J.2
Luke, S.3
-
26
-
-
18744404327
-
-
Retrieved April 30, 2005, from
-
Horrocks, I., Patel-Schneider, P., Boley, H., Tabet, S., Macgregor, R., Grosof, B., & Dean, M. (2003). SWRL: A Semantic Web rule language combining OWL and RuleML, version 0.5. Retrieved April 30, 2005, from http://www.daml.org/rules/proposal/
-
(2003)
SWRL: A Semantic Web Rule Language Combining OWL and RuleML, Version 0.5
-
-
Horrocks, I.1
Patel-Schneider, P.2
Boley, H.3
Tabet, S.4
Macgregor, R.5
Grosof, B.6
Dean, M.7
-
27
-
-
4344716019
-
Authorization and privacy for Semantic Web services
-
July
-
Kagal, L., Paoucci, M., Srinivasan, N., Denker, G., Finin, T., & Sycara, K. (2004, July). Authorization and privacy for Semantic Web services. IEEE Intelligent Systems (Special Issue on Semantic Web Services).
-
(2004)
IEEE Intelligent Systems (Special Issue On Semantic Web Services)
-
-
Kagal, L.1
Paoucci, M.2
Srinivasan, N.3
Denker, G.4
Finin, T.5
Sycara, K.6
-
29
-
-
44949250454
-
-
Retrieved April 30, 2005, from
-
Knowledge Interchange Format. Retrieved April 30, 2005, from http://logic.stanford.edu/kif/kif.html
-
Knowledge Interchange Format
-
-
-
30
-
-
84899338401
-
-
August, Retrieved April 30, 2005, from
-
Kyte, T. (2000, August). Fine grained access control (aka DBMS_RLS). Retrieved April 30, 2005, from http://govt.oracle.com/~tkyte/article2/index.html
-
(2000)
Fine Grained Access Control (aka DBMS_RLS)
-
-
Kyte, T.1
-
31
-
-
84899242259
-
-
Retrieved April 30, 2005, from
-
Menzel, C., & Hayes, P. (2003). Standard common logic. Retrieved April 30, 2005, from http://ceur-ws.org/Vol-82/SI_paper_12.pdf
-
(2003)
Standard Common Logic
-
-
Menzel, C.1
Hayes, P.2
-
32
-
-
77952342496
-
The rule set based access control (RSBAC) Linux kernel security extension
-
November, Enschede, The Netherlands
-
Ott, A. (2001). The rule set based access control (RSBAC) Linux kernel security extension. Proceedings of the International Linux Congress, November, Enschede, The Netherlands.
-
(2001)
Proceedings of the International Linux Congress
-
-
Ott, A.1
-
35
-
-
24944559116
-
Knowledge provenance infrastructure
-
Pinheiro da Silva, P., McGuinness, D., & McCool, R. (2003). Knowledge provenance infrastructure. IEEE Data Engineering Bulletin, 26(4), 26-32.
-
(2003)
IEEE Data Engineering Bulletin
, vol.26
, Issue.4
, pp. 26-32
-
-
Pinheiro da Silva, P.1
McGuinness, D.2
McCool, R.3
-
37
-
-
84899312932
-
PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment
-
Retrieved April 30, 2005, from, - see also: Dan Boneh, Joan Feigenbaum, Avi Silberschatz, and Rebecca Wright, to appear in the, 2004
-
PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment. Retrieved April 30, 2005, from http://crypto.stanford.edu/portia/- see also: Dan Boneh, Joan Feigenbaum, Avi Silberschatz, and Rebecca Wright, to appear in the Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 2004.
-
Bulletin of the IEEE Computer Society Technical Committee On Data Engineering
-
-
-
38
-
-
7944220884
-
-
Retrieved April 30, 2005, from
-
RDF Semantics, W3C Recommendation. Retrieved April 30, 2005, from http://www.w3.org/TR/rdf-mt/
-
RDF Semantics, W3C Recommendation
-
-
-
39
-
-
84899271822
-
-
Retrieved April 30, 2005, from
-
Reno vs. ACLU, 521 US 844 (1997). Retrieved April 30, 2005, from http://supct.law.cornell.edu/supct/html/96-511.ZO.html
-
(1997)
Reno Vs. ACLU, 521 US 844
-
-
-
40
-
-
0040197205
-
Simplified semantics for relevant logics (and some of their rivals)
-
Restall, G. (1993). Simplified semantics for relevant logics (and some of their rivals). Journal of Philosophical Logic, XXII, 481-511.
-
(1993)
Journal of Philosophical Logic, XXII
, pp. 481-511
-
-
Restall, G.1
-
41
-
-
0039605977
-
-
Atascadero, CA: Ridgeview
-
Routley, R., Plumwood, V., Meyer, R.K., & Brady, R.T. (1982). Relevant logics and their rivals. Atascadero, CA: Ridgeview.
-
(1982)
Relevant Logics and Their Rivals
-
-
Routley, R.1
Plumwood, V.2
Meyer, R.K.3
Brady, R.T.4
-
42
-
-
84899163207
-
-
Retrieved April 30, 2005, from, See also [BoTW01]
-
The Rule ML Initiative. Retrieved April 30, 2005, from http://www.ruleml.org/. See also [BoTW01].
-
The Rule ML Initiative
-
-
-
43
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E., Feinstein, H., & Youman, C. (1996). Role-based access control models. IEEE Computer, 29(2), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
45
-
-
84899378094
-
The enterprise privacy authorization language
-
(n.d.), Retrieved April 30, 2005, from
-
Schunter, M. (Ed.). (n.d.). The enterprise privacy authorization language. IBM Corp. Retrieved April 30, 2005, from http://www.zurich.ibm.com/security/enterprise-privacy/epal/Specification/index.html
-
IBM Corp
-
-
Schunter, M.1
|