PuRBAC: Purpose-Aware Role-Based Access Control
暂无分享,去创建一个
[1] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[2] Jorge Lobo,et al. An obligation model bridging access control policies and privacy policies , 2008, SACMAT '08.
[3] Elisa Bertino,et al. Formal foundations for hybrid hierarchies in GTRBAC , 2008, TSEC.
[4] Michael Waidner,et al. Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data , 2002, Privacy Enhancing Technologies.
[5] C. Powers. Privacy Promises, Access Control, and Privacy Management , 2002 .
[6] Joachim Biskup,et al. Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings , 2007, ESORICS.
[7] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[8] Günter Karjoth,et al. Translating privacy practices into privacy promises - how to promise what you can keep , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[9] Michael Waidner,et al. Privacy-enabled services for enterprises , 2002, Proceedings. 13th International Workshop on Database and Expert Systems Applications.
[10] Matthias Schunter,et al. Privacy promises, access control, and privacy management. Enforcing privacy throughout an enterprise by extending access control , 2002, Proceedings. Third International Symposium on Electronic Commerce,.
[11] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .
[12] Elisa Bertino,et al. A roadmap for comprehensive online privacy policy management , 2007, CACM.
[13] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[14] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[15] Jorge Lobo,et al. Conditional Privacy-Aware Role Based Access Control , 2007, ESORICS.
[16] Paul Ashley,et al. E-P3P privacy policies and privacy authorization , 2002, WPES '02.
[17] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[18] Günter Karjoth,et al. A privacy policy model for enterprises , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[19] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[20] Christos Faloutsos,et al. Epidemic thresholds in real networks , 2008, TSEC.
[21] Elisa Bertino,et al. Hybrid role hierarchy for generalized temporal role based access control model , 2002, Proceedings 26th Annual International Computer Software and Applications.
[22] Elisa Bertino,et al. Purpose based access control of complex data for privacy protection , 2005, SACMAT '05.
[23] Jorge Lobo,et al. Privacy-Aware Role-Based Access Control , 2007, IEEE Security & Privacy.
[24] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.