A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling
暂无分享,去创建一个
Sushil Jajodia | Vipin Swarup | Alexander Brodsky | Lei Zhang | S. Jajodia | Lei Zhang | Vipin Swarup | A. Brodsky
[1] LiWu Chang Ira S. Moskowitz. A Decision Theoretical Based System for Information Downgrading , 2000 .
[2] Connolly,et al. Database Systems , 2004 .
[3] James A. Landay,et al. Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.
[4] Elisa Bertino,et al. An Extended Authorization Model for Relational Databases , 1997, IEEE Trans. Knowl. Data Eng..
[5] Claudia Keser,et al. Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[6] David M. Eyers,et al. Using trust and risk in role-based access control policies , 2004, SACMAT '04.
[7] David Ingram,et al. Risk Models for Trust-Based Access Control(TBAC) , 2005, iTrust.
[8] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[9] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[10] P. Rohatgi,et al. Fuzzy MLS : An Experiment on Quantified Risk – Adaptive Access Control , 2007 .
[11] M. Blasgen. Database Systems , 1982, Science.
[12] Etienne J. Khayat,et al. Risk Based Security Analysis of Permissions in RBAC , 2004, WOSIS.
[13] Sushil Jajodia,et al. Toward information sharing: benefit and risk access control (BARAC) , 2006, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06).