Information governance in NHS's NPfIT: A case for policy specification
暂无分享,去创建一个
[1] Carl A. Gunter,et al. Policy‐directed certificate retrieval , 2000 .
[2] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[3] Moritz Y. Becker. A formal security policy for an NHS electronic health record service , 2005 .
[4] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[5] Trent Jaeger,et al. Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999 , 1997, RBAC.
[6] Jean Bacon,et al. A model of OASIS role-based access control and its support for active security , 2002, ACM Trans. Inf. Syst. Secur..
[7] Moritz Y. Becker. Cassandra: flexible trust management and its application to electronic health records , 2005 .
[8] Ninghui Li,et al. Towards practical automated trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[9] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[10] Ross J. Anderson,et al. Information technology in medical practice: safety and privacy lessons from the United Kingdom , 1999, The Medical journal of Australia.
[11] Joseph Y. Halpern,et al. Using First-Order Logic to Reason about Policies , 2008, TSEC.
[12] Joan Feigenbaum,et al. The KeyNote Trust-Management System , 1998 .
[13] K.E. Seamons,et al. Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[14] Jan Vitek,et al. Secure Internet Programming , 1999 .
[15] Peter Sewell,et al. Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[16] Ravi S. Sandhu,et al. Rationale for the RBAC96 family of access control models , 1996, RBAC '95.
[17] Peter Sewell,et al. Cassandra: distributed access control policies with tunable expressiveness , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..
[18] John DeTreville,et al. Binder, a logic-based security language , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[19] Trevor Jim,et al. SD3: a trust management system with certified evaluation , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[20] Carl M. Ellison,et al. SPKI Requirements , 1999, RFC.
[21] S. Brennan. The NHS IT Project: The Biggest Computer Programme in the World... Ever! , 2005 .
[22] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[23] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .