Final requirements and state-of-the-art for next generation policies
暂无分享,去创建一个
[1] Ernesto Damiani,et al. Supporting location-based conditions in access control policies , 2006, ASIACCS '06.
[2] Gail-Joon Ahn,et al. Managing privacy preferences for federated identity management , 2005, DIM '05.
[3] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[4] Pierangela Samarati,et al. A Uniform Framework for Regulating Service Access and Information Release on the Web , 2002, J. Comput. Secur..
[5] Blair Dillaway,et al. Abductive Authorization Credential Gathering , 2009, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks.
[6] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[7] Ramakrishnan Srikant,et al. An XPath-based preference language for P3P , 2003, WWW '03.
[8] Springer-Verlag, 2001. , .
[9] Paul Ashley,et al. E-P3P privacy policies and privacy authorization , 2002, WPES '02.
[10] Andrew D. Gordon,et al. SecPAL: Design and semantics of a decentralized authorization language , 2010, J. Comput. Secur..
[11] Andrew D. Gordon,et al. Design and Semantics of a Decentralized Authorization Language , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).