Role-Based Access Control Models
Computer
A model of OASIS role-based access control and its support for active security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
What You Always Wanted to Know About Datalog (And Never Dared to Ask)
IEEE Transactions on Knowledge and Data Engineering
The Magic of Duplicates and Aggregates
VLDB '90 Proceedings of the 16th International Conference on Very Large Data Bases
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Binder, a Logic-Based Security Language
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Requirements for Policy Languages for Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
A formal framework for reflective database access control policies
Proceedings of the 15th ACM conference on Computer and communications security
Proceedings of the 6th ACM conference on Embedded network sensor systems
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
IJCAI'03 Proceedings of the 18th international joint conference on Artificial intelligence
Effective trust management through a hybrid logical and relational approach
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
A logic for state-modifying authorization policies
ACM Transactions on Information and System Security (TISSEC)
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
IEEE Security and Privacy
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
Proceedings of the Seventh Symposium on Usable Privacy and Security
My privacy policy: exploring end-user specification of free-form location access rules
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
When privacy and utility are in harmony: towards better design of presence technologies
Personal and Ubiquitous Computing
Hi-index | 0.00 |
With the widespread use of online social networks and mobile devices, it is not uncommon for people to continuously broadcast contextual information such as their current location or activity. These technologies present both new opportunities for social engagement and new risks to privacy, and traditional static "write once" disclosure policies are not well suited for controlling aggregate exposure risks in the current technological landscape. Therefore, we present PlexC, a new policy language designed for exposure control. We take advantage of several recent user studies to identify a set of language requirements and features, providing the expressive power to accommodate information sharing in dynamic environments. In our evaluation we show that PlexC can concisely express common policy idioms drawn from survey responses, in addition to more complex information sharing scenarios.