Arithmetic classification of perfect models of stratified programs
Fundamenta Informaticae - Special issue on LOGIC PROGRAMMING
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
The alternating fixpoint of logic programs with negation
PODS '89 Selected papers of the eighth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
A relational model of data for large shared data banks
Communications of the ACM
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
Unification in Privacy Policy Evaluation - Translating EPAL into Prolog
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
A comparison of two privacy policy languages: EPAL and XACML
Proceedings of the 3rd ACM workshop on Secure web services
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Efficient and flexible access control via Jones-optimal logic program specialisation
Higher-Order and Symbolic Computation
ACM Transactions on Information and System Security (TISSEC)
P3P: Making Privacy Policies More Useful
IEEE Security and Privacy
Event-oriented Web-based E-trading
Electronic Notes in Theoretical Computer Science (ENTCS)
The next 700 access control models or a unifying meta-model?
Proceedings of the 14th ACM symposium on Access control models and technologies
Privacy-Aware Role-Based Access Control
IEEE Security and Privacy
An information flow control meta-model
Proceedings of the 18th ACM symposium on Access control models and technologies
Consistency checking in privacy-aware access control
Proceedings of the 51st ACM Southeast Conference
Hi-index | 0.00 |
We address the problem of providing data subjects with self-selected controls on access to their personal information. Existing approaches for this are not always sufficient in terms of offering the degrees of control and scope for individualization of access policies that are needed for personal data protection (and usage). We introduce a conceptual framework, a syntax, a semantics, and an axiomatization of a generalized form of access control meta-model, which may be specialized in various ways to enable data subjects to specify flexibly what access controls are to apply on their personal data.