Privacy-Aware Access Control
暂无分享,去创建一个
Dimitra I. Kaklamani | Iakovos S. Venieris | Eugenia I. Papagiannakopoulou | Maria N. Koukovini | Georgios V. Lioudakis | Nikolaos L. Dellas
[1] G. Greenleaf. The Influence of European Data Privacy Standards Outside Europe: Implications for Globalisation of Convention 108 , 2012 .
[2] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[3] Elisa Bertino,et al. A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.
[4] Nora Cuppens-Boulahia,et al. Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model , 2013, FPS.
[5] Dimitra I. Kaklamani,et al. Legislation-Aware Privacy Protection in Passive Network Monitoring , 2010 .
[6] Nora Cuppens-Boulahia,et al. A privacy-aware access control model for distributed network monitoring , 2013, Comput. Electr. Eng..
[7] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[8] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[9] Ninghui Li,et al. Purpose based access control for privacy protection in relational database systems , 2008, The VLDB Journal.
[10] Serge Gutwirth,et al. European Data Protection: Coming of Age , 2013, European Data Protection.
[11] Elisa Bertino,et al. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control , 2005, TSEC.
[12] Dimitra I. Kaklamani,et al. An Ontology for Privacy-aware Access Control in Network Monitoring Environments , 2014, J. Res. Pract. Inf. Technol..
[13] Dimitra I. Kaklamani,et al. Privacy Protection in Context-Aware Web Services , 2010 .
[14] Marco Casassa Mont,et al. Dealing with Privacy Obligations: Important Aspects and Technical Approaches , 2004, TrustBus.
[15] Nora Cuppens-Boulahia,et al. Modeling contextual security policies , 2008, International Journal of Information Security.
[16] Rasool Jalili,et al. GTHBAC: A Generalized Temporal History Based Access Control Model , 2010, Telecommun. Syst..
[17] Dimitra I. Kaklamani,et al. Leveraging Access Control for Privacy Protection: A Survey , 2012 .
[18] Graham Greenleaf,et al. Sheherezade and the 101 Data Privacy Laws: Origins, Significance and Global Trajectories , 2013 .
[19] Michael D Birnhack,et al. The EU Data Protection Directive: An engine of a global regime , 2008, Comput. Law Secur. Rev..