|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 39 occurrences of 25 keywords
|
|
|
Results
Found 22 publication records. Showing 21 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
98 | Jaijit Bhattacharya, S. K. Gupta 0001 |
EPAL Based Privacy Enforcement Using ECA Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 120-133, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
85 | Anne H. Anderson |
A comparison of two privacy policy languages: EPAL and XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 53-60, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
XACML, privacy policy, policy language, EPAL |
85 | William H. Stufflebeam, Annie I. Antón, Qingfeng He, Neha Jain |
Specifying privacy policies with P3P and EPAL: lessons learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 35, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, requirements engineering, healthcare, P3P, policy specification, EPAL |
70 | Adam Barth, John C. Mitchell |
Enterprise privacy promises and enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WITS ![In: Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005, pp. 58-66, 2005, ACM, 1-58113-980-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
policy summary, modal logic, privacy policy, P3P, EPAL |
62 | Yuh-Jong Hu, Hong-Yi Guo, Guang-De Lin |
Semantic Enforcement of Privacy Protection Policies via the Combination of Ontologies and Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008), 11-13 June 2008, Taichung, Taiwan, pp. 400-407, 2008, IEEE Computer Society, 978-0-7695-3158-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ontology, semantic web, rule, privacy protection, web 3.0, semantic email |
62 | Jaijit Bhattacharya, S. K. Gupta 0001, Bhurvi Agrawal |
Protecting Privacy of Health Information through Privacy Broker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Adam Barth, John C. Mitchell, Justin Rosenstein |
Conflict and combination in privacy policy languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 45-46, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
policy combination, privacy policy |
62 | Michael Backes 0001, Markus Dürmuth, Rainer Steinwandt |
An Algebra for Composing Enterprise Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 33-52, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Michael Backes 0001, Markus Dürmuth, Günter Karjoth |
Unification in Privacy Policy Evaluation - Translating EPAL into Prolog. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 7-9 June 2004, Yorktown Heights, NY, USA, pp. 185-188, 2004, IEEE Computer Society, 0-7695-2141-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
51 | Orleant Njamen Epal |
NETAH a framework for composing distributed event flows. (NETAH, un framework pour la composition distribuée de flux d'événements). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
36 | Hamideh Afsarmanesh, Simon Samwel Msanjila |
ePAL Vision 2020 for Active Ageing of Senior Professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRO-VE ![In: Collaborative Networks for a Sustainable World - 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010. Proceedings, pp. 60-72, 2010, Springer, 978-3-642-15960-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Luis M. Camarinha-Matos, Hamideh Afsarmanesh, Antonio del Cura, Jim Playfoot |
ePAL roadmap for active ageing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PervasiveHealth ![In: 4th International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2010, Munich, Germany, 22-25 March, 2010, pp. 1-8, 2010, IEEE, 978-963-9799-89-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Patrick C. K. Hung, Dickson K. W. Chiu, W. W. Fung, William K. Cheung 0001, Raymond K. Wong 0001, Samuel P. M. Choi, Eleanna Kafeza, James T. Kwok, Joshua C. C. Pun, Vivying S. Y. Cheng |
Towards end-to-end privacy control in the outsourcing of marketing activities: a web service integration solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 454-461, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Web service integration, need-to-know principle, OWL, SOAP, WSDL, privacy policies, UDDI, EPAL |
28 | Patrick C. K. Hung, Elena Ferrari, Barbara Carminati |
Towards Standardized Web Services Privacy Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: Proceedings of the IEEE International Conference on Web Services (ICWS'04), June 6-9, 2004, San Diego, California, USA, pp. 174-, 2004, IEEE Computer Society, 0-7695-2167-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Web services, SOAP, WSDL, WS-Security, privacy policies, P3P, UDDI, EPAL |
21 | Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo 0001 |
Privacy-aware role based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 41-50, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
model, privacy, role based access control, purpose |
21 | Qun Ni, Dan Lin 0001, Elisa Bertino, Jorge Lobo 0001 |
Conditional Privacy-Aware Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 72-89, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Dominik Raub, Rainer Steinwandt |
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 130-144, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum |
Privacy and Contextual Integrity: Framework and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 184-198, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Dickson K. W. Chiu, Patrick C. K. Hung |
Privacy and Access Control Issues in Financial Enterprise Content Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Hyang-Chang Choi, YongHoon Yi, Jae-Hyun Seo, BongNam Noh, HyungHyo Lee |
A Privacy Protection Model in ID Management Using Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 82-91, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Michael Backes 0001, Birgit Pfitzmann, Matthias Schunter |
A Toolkit for Managing Enterprise Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings, pp. 162-180, 2003, Springer, 3-540-20300-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #21 of 21 (100 per page; Change: )
|
|