A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises
暂无分享,去创建一个
[1] Marco Casassa Mont,et al. On Adaptive Identity Management: The Next Generation of Identity Management Technologies , 2003 .
[2] Michael Waidner,et al. Privacy-enabled services for enterprises , 2002, Proceedings. 13th International Workshop on Database and Expert Systems Applications.
[3] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[4] Marco Casassa Mont,et al. Privacy Enforcement with HP Select Access for Regulatory Compliance , 2005 .
[5] Marco Casassa Mont,et al. Privacy policy enforcement in enterprises with identity management solutions , 2006, J. Comput. Secur..
[6] Elisa Bertino. Purpose Based Access Control for Privacy Protection in Database Systems , 2005, DASFAA.
[7] P. Bramhall,et al. Extending HP Identity Management Solutions to Enforce Privacy Policies and Obligations for Regulatory Compliance by Enterprises ♦ , 2005 .
[8] Elisa Bertino,et al. Privacy Protection , 2022 .
[9] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[10] Marco Casassa Mont,et al. Dealing with Privacy Obligations in Enterprises , 2004, ISSE.
[11] Marco Casassa Mont,et al. Privacy Enforcement for IT Governance in Enterprises: Doing It for Real , 2005, TrustBus.
[12] Marco Casassa Mont,et al. Dealing with Privacy Obligations: Important Aspects and Technical Approaches , 2004, TrustBus.