Artificial Intelligence - Special issue on knowledge representation
An access control model supporting periodicity constraints and temporal reasoning
ACM Transactions on Database Systems (TODS)
AAAI '99/IAAI '99 Proceedings of the sixteenth national conference on Artificial intelligence and the eleventh Innovative applications of artificial intelligence conference innovative applications of artificial intelligence
Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Time Granularities in Databases, Data Mining and Temporal Reasoning
Time Granularities in Databases, Data Mining and Temporal Reasoning
Proceedings of the International Workshop on Policies for Distributed Systems and Networks
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
On Maintaining Priorities in a Production Rule System
VLDB '91 Proceedings of the 17th International Conference on Very Large Data Bases
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Monitors for History-Based Policies
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
E-P3P privacy policies and privacy authorization
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
A Privacy Policy Model for Enterprises
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Efficient comparison of enterprise privacy policies
Proceedings of the 2004 ACM symposium on Applied computing
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
A logical specification for usage control
Proceedings of the ninth ACM symposium on Access control models and technologies
Formal model and policy specification of usage control
ACM Transactions on Information and System Security (TISSEC)
On the modeling and analysis of obligations
Proceedings of the 13th ACM conference on Computer and communications security
The monitorability of service-level agreements for application-service provision
WOSP '07 Proceedings of the 6th international workshop on Software and performance
Proceedings of the 12th ACM symposium on Access control models and technologies
High Level Conflict Management Strategies in Advanced Access Control Models
Electronic Notes in Theoretical Computer Science (ENTCS)
Provisions and obligations in policy management and security applications
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Editorial: Some issues in privacy data management
Data & Knowledge Engineering
Security policy compliance with violation management
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
A secure framework for publishing virtual community contracts
International Journal of Web Based Communities
A general obligation model and continuity: enhanced policy enforcement engine for usage control
Proceedings of the 13th ACM symposium on Access control models and technologies
An obligation model bridging access control policies and privacy policies
Proceedings of the 13th ACM symposium on Access control models and technologies
Towards the development of privacy-aware systems
Information and Software Technology
An Extended Role-Based Access Control Model for Delegating Obligations
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Privacy inspection and monitoring framework for automated business processes
WISE'07 Proceedings of the 8th international conference on Web information systems engineering
Formalization and management of group obligations
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
xDUCON: cross domain usage control through shared data spaces
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
A dynamic privacy model for web services
Computer Standards & Interfaces
Negotiating and delegating obligations
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
A practical generic privacy language
ICISS'10 Proceedings of the 6th international conference on Information systems security
Protecting critical infrastructures while preserving each organization's autonomy
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
An algebra for enterprise privacy policies closed under composition and conjunction
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
On practical specification and enforcement of obligations
Proceedings of the second ACM conference on Data and Application Security and Privacy
A flexible authorization framework for e-commerce
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Privacy injector — automated privacy enforcement through aspects
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
A data sharing agreement framework
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Exploiting node mobility for coordinating data usage in crisis scenarios
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Survey: Usage control in computer security: A survey
Computer Science Review
Conditional privacy-aware role based access control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Obligations and their interaction with programs
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations
International Journal of Mobile Computing and Multimedia Communications
Beyond accountability: using obligations to reduce risk exposure and deter insider attacks
Proceedings of the 18th ACM symposium on Access control models and technologies
CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Formal specification and management of security policies with collective group obligations
Journal of Computer Security
Hi-index | 0.00 |
Policies are widely used in modern systems and applications.Recently, it has been recognized that simple decisionsare just not enough for many systems and applications.Many policies require actions to be performed aftera decision is made in accordance with the policy. To addressthis need, this paper studies the notions of obligations,which are those conditions or actions that must be fulfilledby either the users or the system after the decision. This paperformalizes the obligations and investigates mechanismsfor monitoring obligations. Especially, the paper discussesvarious aspects of how the system may compensate unfulfilledobligations.