Foundations of logic programming
Foundations of logic programming
Information Processing Letters
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
IEEE ADL '97 Proceedings of the IEEE international forum on Research and technology advances in digital libraries
World Wide Web Journal - Special issue: Web security: a matter of trust
Referee: trust management for Web applications
World Wide Web Journal - Special issue: Web security: a matter of trust
The platform for privacy preferences
Communications of the ACM
Mind your vocabulary: query mapping across heterogeneous information sources
SIGMOD '99 Proceedings of the 1999 ACM SIGMOD international conference on Management of data
Data on the Web: from relations to semistructured data and XML
Data on the Web: from relations to semistructured data and XML
Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
The &OHgr; key management service
Journal of Computer Security
The Conceptual Basis for Mediation Services
IEEE Expert: Intelligent Systems and Their Applications
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Mechanism for Establishing Policies for Electronic Commerce
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Communication Agreement Framework for Access/Action Control
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
An access control framework for business processes for web services
Proceedings of the 2003 ACM workshop on XML security
Trust-serv: model-driven lifecycle management of trust negotiation policies for web services
Proceedings of the 13th international conference on World Wide Web
A logic-based framework for attribute based access control
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
KNOW Why your access was denied: regulating feedback for usable security
Proceedings of the 11th ACM conference on Computer and communications security
IEEE Intelligent Systems
An Authorization Model for Geospatial Data
IEEE Transactions on Dependable and Secure Computing
Managing Multiple and Dependable Identities
IEEE Internet Computing
Model-Driven Trust Negotiation for Web Services
IEEE Internet Computing
Adaptive trust negotiation and access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Anonymous yet accountable access control
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Privacy and identity management for everyone
Proceedings of the 2005 workshop on Digital identity management
Supporting location-based conditions in access control policies
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
A survey of autonomic communications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Trust management services in relational databases
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication
Journal of Network and Systems Management
Decentralized authorization and data security in web content delivery
Proceedings of the 2007 ACM symposium on Applied computing
Adaptive Trust Negotiation and Access Control for Grids
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
Resource management for global public computing: many policies are better than (n)one
WORLDS'06 Proceedings of the 3rd conference on USENIX Workshop on Real, Large Distributed Systems - Volume 3
Security-by-contract for web services
Proceedings of the 2007 ACM workshop on Secure web services
A Trust- and Property-based Access Control Model
Electronic Notes in Theoretical Computer Science (ENTCS)
Achieving simultaneous distribution control and privacy protection for Internet media delivery
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Access control policies and languages
International Journal of Computational Science and Engineering
Interactive access control for autonomic systems: From theory to implementation
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
Notarized federated ID management and authentication
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
A privacy-aware access control system
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
Private Information: To Reveal or not to Reveal
ACM Transactions on Information and System Security (TISSEC)
Regulating Exceptions in Healthcare Using Policy Spaces
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Preserving confidentiality of security policies in data outsourcing
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Trust Management and Trust Negotiation in an Extension of SQL
Trustworthy Global Computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Persona: an online social network with user-defined privacy
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
A negotiation-based trust establishment service for CROWN grid
International Journal of Autonomous and Adaptive Communications Systems
Privacy-aware identity management for client-side mashup applications
Proceedings of the 5th ACM workshop on Digital identity management
An XACML-based privacy-centered access control system
Proceedings of the first ACM workshop on Information security governance
A Web Service Architecture for Enforcing Access Control Policies
Electronic Notes in Theoretical Computer Science (ENTCS)
XML-based access control languages
Information Security Tech. Report
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
A privacy-enhanced attribute-based access control system
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Component-based security policy design with colored Petri nets
Semantics and algebraic specification
A card requirements language enabling privacy-preserving access control
Proceedings of the 15th ACM symposium on Access control models and technologies
Initial trust formation in Virtual Organisations
International Journal of Internet Technology and Secured Transactions
Detecting conflicts in ABAC policies with rule-reduction and binary-search techniques
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Supporting privacy preferences in credential-based interactions
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Attribute-Based Messaging: Access Control and Confidentiality
ACM Transactions on Information and System Security (TISSEC)
Fine-grained disclosure of access policies
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Towards flexible credential negotiation protocols
Proceedings of the 11th international conference on Security Protocols
Towards a formal framework for distributed identity management
APWeb'05 Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development
Argumentation for access control
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
Notarized federated identity management for web services
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Enhancing user privacy through data handling policies
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Point-based trust: define how much privacy is worth
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Semantic web policies – a discussion of requirements and research issues
ESWC'06 Proceedings of the 3rd European conference on The Semantic Web: research and applications
The architecture of a privacy-aware access control decision component
CASSIS'05 Proceedings of the Second international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Offline expansion of XACML policies based on p3p metadata
ICWE'05 Proceedings of the 5th international conference on Web Engineering
Policies, models, and languages for access control
DNIS'05 Proceedings of the 4th international conference on Databases in Networked Information Systems
Towards privacy-enhanced authorization policies and languages
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
Interactive credential negotiation for stateful business processes
iTrust'05 Proceedings of the Third international conference on Trust Management
Privacy in the electronic society
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Integrating trust management and access control in data-intensive Web applications
ACM Transactions on the Web (TWEB)
Datalog for security, privacy and trust
Datalog'10 Proceedings of the First international conference on Datalog Reloaded
A unified attribute-based access control model covering DAC, MAC and RBAC
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Rule-based policy representation and reasoning for the semantic web
RW'07 Proceedings of the Third international summer school conference on Reasoning Web
Formal definitions for usable access control rule sets from goals to metrics
Proceedings of the Ninth Symposium on Usable Privacy and Security
A model for trust-based access control and delegation in mobile clouds
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Hi-index | 0.00 |
The widespread use of Internet-based services is increasing the amount of information (such as user profiles) that clients are required to disclose. This information demand is necessary for regulating access to services, and functionally convenient (e.g., to support service customization), but it has raised privacy-related concerns which, if not addressed, may affect the users disposition to use network services. At the same time, servers need to regulate service access without disclosing entirely the details of their access control policy. There is therefore a pressing need for privacy-aware techniques to regulate access to services open to the network.We propose an approach for regulating service access and information disclosure on the Web. The approach consists of a uniform formal framework to formulate - and reason about - both service access and information disclosure constraints. It also provides a means for parties to communicate their requirements while ensuring that no private information be disclosed and that the communicated requirements are correct with respect to the constraints.