Visualising Access Control: The PRISM Approach
暂无分享,去创建一个
Dimitra I. Kaklamani | Iakovos S. Venieris | Georgios V. Lioudakis | Fotios Gogoulos | Anna Antonakopoulou | Aziz S. Mousas
[1] Dimitra I. Kaklamani,et al. Privacy-Aware Access Control and Authorization in Passive Network Monitoring Infrastructures , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[2] Dirk Grunwald,et al. Legal issues surrounding monitoring during network research , 2007, IMC '07.
[3] Diomidis Spinellis,et al. The Athens Affair , 2007, IEEE Spectrum.
[4] X Itu,et al. Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .
[5] Dimitra I. Kaklamani,et al. Semantic Information Model for Privacy-Aware Access Control , 2010, 2010 14th Panhellenic Conference on Informatics.
[6] Dimitra I. Kaklamani,et al. Privacy-Aware Passive Network Monitoring , 2009, 2009 13th Panhellenic Conference on Informatics.
[7] Frank van Harmelen,et al. Web Ontology Language: OWL , 2004, Handbook on Ontologies.