Privacy-Aware Access Control

[1]  G. Greenleaf The Influence of European Data Privacy Standards Outside Europe: Implications for Globalisation of Convention 108 , 2012 .

[2]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[3]  Elisa Bertino,et al.  A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.

[4]  Nora Cuppens-Boulahia,et al.  Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model , 2013, FPS.

[5]  Dimitra I. Kaklamani,et al.  Legislation-Aware Privacy Protection in Passive Network Monitoring , 2010 .

[6]  Nora Cuppens-Boulahia,et al.  A privacy-aware access control model for distributed network monitoring , 2013, Comput. Electr. Eng..

[7]  Ramakrishnan Srikant,et al.  Hippocratic Databases , 2002, VLDB.

[8]  Sabrina De Capitani di Vimercati,et al.  Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.

[9]  Ninghui Li,et al.  Purpose based access control for privacy protection in relational database systems , 2008, The VLDB Journal.

[10]  Serge Gutwirth,et al.  European Data Protection: Coming of Age , 2013, European Data Protection.

[11]  Elisa Bertino,et al.  X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control , 2005, TSEC.

[12]  Dimitra I. Kaklamani,et al.  An Ontology for Privacy-aware Access Control in Network Monitoring Environments , 2014, J. Res. Pract. Inf. Technol..

[13]  Dimitra I. Kaklamani,et al.  Privacy Protection in Context-Aware Web Services , 2010 .

[14]  Marco Casassa Mont,et al.  Dealing with Privacy Obligations: Important Aspects and Technical Approaches , 2004, TrustBus.

[15]  Nora Cuppens-Boulahia,et al.  Modeling contextual security policies , 2008, International Journal of Information Security.

[16]  Rasool Jalili,et al.  GTHBAC: A Generalized Temporal History Based Access Control Model , 2010, Telecommun. Syst..

[17]  Dimitra I. Kaklamani,et al.  Leveraging Access Control for Privacy Protection: A Survey , 2012 .

[18]  Graham Greenleaf,et al.  Sheherezade and the 101 Data Privacy Laws: Origins, Significance and Global Trajectories , 2013 .

[19]  Michael D Birnhack,et al.  The EU Data Protection Directive: An engine of a global regime , 2008, Comput. Law Secur. Rev..