A privacy-aware access control system
暂无分享,去创建一个
Sabrina De Capitani di Vimercati | Pierangela Samarati | Marco Cremonini | Claudio Agostino Ardagna | P. Samarati | S. Vimercati | M. Cremonini | C. Ardagna
[1] Robert M. Deiters. Organization for Economic Co-Operation and Development (OECD). , 1968 .
[2] Joachim Biskup,et al. The personal model of data: Towards a privacy-oriented information system , 1988, Comput. Secur..
[3] Hans Hermann Brüggemann,et al. Interaction of Authorities and Acquaintances in the DORIS privacy model of data , 1989, MFDBS.
[4] Herbert Burkert,et al. Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .
[5] Marianne Winslett,et al. Assuring security and privacy for digital library transactions on the Web: client and server security policies , 1997, Proceedings of ADL '97 Forum on Research and Technology. Advances in Digital Libraries.
[6] Marianne Winslett,et al. Internet Credential Acceptance Policies , 1997, APPIA-GULP-PRODE.
[7] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[8] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[9] K.E. Seamons,et al. Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[10] Marianne Winslett,et al. PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet , 2000, CCS.
[11] Marianne Winslett,et al. Interoperable strategies in automated trust negotiation , 2001, CCS '01.
[12] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .
[13] Lorrie Faith Cranor,et al. Web Privacy with P3p , 2002 .
[14] Günter Karjoth,et al. A privacy policy model for enterprises , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[15] Pierangela Samarati,et al. A Uniform Framework for Regulating Service Access and Information Release on the Web , 2002, J. Comput. Secur..
[16] Michael Waidner,et al. Privacy-enabled services for enterprises , 2002, Proceedings. 13th International Workshop on Database and Expert Systems Applications.
[17] Sushil Jajodia,et al. Provisions and Obligations in Policy Management and Security Applications , 2002, VLDB.
[18] Marianne Winslett,et al. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation , 2003, TSEC.
[19] Marianne Winslett,et al. A unified scheme for resource protection in automated trust negotiation , 2003, 2003 Symposium on Security and Privacy, 2003..
[20] Ramakrishnan Srikant,et al. An XPath-based preference language for P3P , 2003, WWW '03.
[21] Kent E. Seamons,et al. Mobile Trust Negotiation - Authentication and Authorization in Dynamic Mobile Networks , 2004, Communications and Multimedia Security.
[22] Ernesto Damiani,et al. Extending Policy Languages to the Semantic Web , 2004, ICWE.
[23] Marianne Winslett,et al. No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web , 2004, ESWS.
[24] Vijayalakshmi Atluri,et al. Preserving mobile customer privacy: an access control system for moving objects and customer profiles , 2005, MDM '05.
[25] Ernesto Damiani,et al. Towards Privacy-Enhanced Authorization Policies and Languages , 2005, DBSec.
[26] Bhavani M. Thuraisingham,et al. Privacy constraint processing in a privacy-enhanced database management system , 2005, Data Knowl. Eng..
[27] Ramaswamy Chandramouli. Privacy protection of enterprise information through inference analysis , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[28] Piero A. Bonatti,et al. Driving and monitoring provisional trust negotiation with metapolicies , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[29] Gail-Joon Ahn,et al. Managing privacy preferences for federated identity management , 2005, DIM '05.
[30] Li Zhou,et al. Adaptive trust negotiation and access control , 2005, SACMAT '05.
[31] Sabrina De Capitani di Vimercati,et al. Enhancing User Privacy Through Data Handling Policies , 2006, DBSec.
[32] Ernesto Damiani,et al. Supporting location-based conditions in access control policies , 2006, ASIACCS '06.
[33] Günther Pernul,et al. A Privacy-Enhanced Attribute-Based Access Control System , 2007, DBSec.
[34] Marco Casassa Mont,et al. On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises , 2007, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).