Toward practical authorization-dependent user obligation systems
暂无分享,去创建一个
Ting Yu | Keith Irwin | William H. Winsborough | Omar Chowdhury | Murillo Pontual | Omar Chowdhury | M. Pontual | Keith Irwin | W. Winsborough | Ting Yu
[1] A. J. I. Jones. On the relationship between permission and obligation , 1987, ICAIL '87.
[2] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[3] Era moderna até. Health Insurance Portability and Accountability Act , 2011 .
[4] Jorge Lobo,et al. Toward a Formal Characterization of Policy Specification & Analysis , 2007 .
[5] A. Bundy. Proceedings of the Eighth International Joint Conference on Artificial Intelligence : IJCAI-83, 8-12 August 1983, Karlsruhe, West Germany , 1983 .
[6] Edmund M. Clarke,et al. Symbolic Model Checking: 10^20 States and Beyond , 1990, Inf. Comput..
[7] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[8] C. R. Ramakrishnan,et al. Policy Analysis for Administrative Role Based Access Control , 2006, CSFW.
[9] Sérgio Vale Aguiar Campos,et al. Symbolic Model Checking , 1993, CAV.
[10] Arnon Rosenthal,et al. A Data Sharing Agreement Framework , 2006, ICISS.
[11] Helen Nissenbaum,et al. Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[12] Paulo Ferreira,et al. Obligation policies: an enforcement platform , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[13] Insup Lee,et al. Privacy APIs: access control techniques to analyze and verify legal privacy policies , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[14] Abe Lockman,et al. Ensuring integrity by adding obligations to privileges , 1985, ICSE '85.
[15] Jorge Lobo,et al. Privacy-Aware Role-Based Access Control , 2007, IEEE Security & Privacy.
[16] Sushil Jajodia,et al. Provisions and Obligations in Policy Rule Management , 2003, Journal of Network and Systems Management.
[17] Ting Yu,et al. Assigning Responsibility for Failed Obligations , 2008, IFIPTM.
[18] Jeffrey M. Bradshaw,et al. KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[19] Kathi Fisler,et al. Obligations and Their Interaction with Programs , 2007, ESORICS.
[20] Jorge Lobo,et al. An obligation model bridging access control policies and privacy policies , 2008, SACMAT '08.
[21] Jorge Lobo,et al. Conditional Privacy-Aware Role Based Access Control , 2007, ESORICS.
[22] Ting Yu,et al. On the modeling and analysis of obligations , 2006, CCS '06.