Efficient comparison of enterprise privacy policies
暂无分享,去创建一个
[1] André Zúquete,et al. SPL: An Access Control Language for Security Policies and Complex Constraints , 2001, NDSS.
[2] Günter Karjoth,et al. A privacy policy model for enterprises , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[3] S. Fischer-h bner. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .
[4] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[5] Sushil Jajodia,et al. Obligation monitoring in policy management , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[6] Ernesto Damiani,et al. A component-based architecture for secure data publication , 2001, Seventeenth Annual Computer Security Applications Conference.
[7] Paul Ashley,et al. E-P3P privacy policies and privacy authorization , 2002, WPES '02.
[8] Birgit Pfitzmann,et al. A Toolkit for Managing Enterprise Privacy Policies , 2003, ESORICS.
[9] Michael Waidner,et al. Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data , 2002, Privacy Enhancing Technologies.