Towards safer information sharing in the cloud. | 4 | 0.47 | 2015 |
End-to-end policy based encryption techniques for multi-party data management | 4 | 0.39 | 2014 |
A toolkit for automating compliance in cloud computing services. | 5 | 0.45 | 2014 |
Semantic Generation of Clouds Privacy Policies. | 0 | 0.34 | 2014 |
A SWRL Bridge to XACML for Clouds Privacy Compliant Policies. | 2 | 0.37 | 2014 |
Security and Privacy Governance in Cloud Computing via SLAs and a Policy Orchestration Service. | 2 | 0.37 | 2012 |
ReasONets: a fuzzy-based approach for reasoning on network incidents | 0 | 0.34 | 2012 |
Automating Compliance for Cloud Computing Services. | 0 | 0.34 | 2012 |
End-to-End Policy-Based Encryption and Management of Data in the Cloud | 14 | 0.71 | 2011 |
Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes | 0 | 0.34 | 2011 |
Enhancing Accountability in the Cloud via Sticky Policies | 7 | 0.70 | 2011 |
Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography | 4 | 0.49 | 2011 |
Economic Methods and Decision Making by Security Professionals. | 0 | 0.34 | 2011 |
Assurance for federated identity management | 5 | 0.58 | 2010 |
A Conceptual Model For Privacy Policies With Consent And Revocation Requirements | 11 | 0.65 | 2010 |
Privacy Aware Access Controls for Medical Data Disclosure on European Healthgrids. | 0 | 0.34 | 2010 |
EnCoRe: Towards a Holistic Approach to Privacy. | 5 | 0.51 | 2010 |
Extending XACML access control architecture for allowing preference-based authorisation | 3 | 0.38 | 2010 |
Using security metrics coupled with predictive modeling and simulation to assess security processes | 5 | 0.62 | 2009 |
Ontology-Based Privacy Compliance on European Healthgrid Domains | 2 | 0.39 | 2009 |
Using Modelling and Simulation for Policy Decision Support in Identity Management | 5 | 0.59 | 2009 |
Modelling and Enforcing Privacy for Medical Data Disclosure across Europe. | 2 | 0.42 | 2009 |
Automatic Compliance of Privacy Policies in Federated Digital Identity Management | 4 | 0.45 | 2008 |
Securing Information Transfer in Distributed Computing Environments | 6 | 0.55 | 2008 |
On identity assurance in the presence of federated identity management systems | 2 | 0.59 | 2007 |
On device-based identity management in enterprises | 3 | 0.59 | 2007 |
Panel Discussion Managing Digital Identities --- Challenges and Opportunities | 0 | 0.34 | 2007 |
On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises | 22 | 1.11 | 2007 |
A systematic approach to privacy enforcement and policy compliance checking in enterprises | 5 | 0.58 | 2006 |
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments | 3 | 0.63 | 2006 |
A systemic approach to automate privacy policy enforcement in enterprises | 15 | 1.69 | 2006 |
Towards scalable management of privacy obligations in enterprises | 7 | 0.88 | 2006 |
On Privacy-aware Information Lifecycle Management in Enterprises: Setting the Context | 2 | 0.40 | 2006 |
How ordinary internet users can have a chance to influence privacy policies | 1 | 0.38 | 2006 |
Provision of trusted identity management using trust credentials | 1 | 0.35 | 2006 |
Privacy enforcement for IT governance in enterprises: doing it for real | 2 | 0.52 | 2005 |
An adaptive privacy management system for data repositories | 10 | 0.82 | 2005 |
Handling Privacy Obligations In Enterprises: Important Aspects And Technical Approaches | 1 | 0.44 | 2005 |
Persistent and dynamic trust: analysis and the related impact of trusted platforms | 11 | 1.13 | 2005 |
Position paper: Rule Language Requirement for Privacy-Enabled Identity Management | 0 | 0.34 | 2005 |
Dealing with Privacy Obligations: Important Aspects and Technical Approaches | 28 | 2.84 | 2004 |
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care | 25 | 1.39 | 2003 |
The HP time vault service: exploiting IBE for timed release of confidential information | 24 | 1.90 | 2003 |
Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information | 0 | 0.34 | 2002 |
Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components | 1 | 0.38 | 2002 |
Negotiated Revealing of Traders' Credentials in e-Marketplaces: Dealing with Trust and Privacy Issues | 1 | 0.47 | 2002 |
A Distributed System, Adaptive to Trust Assessment, Based on Peer-to-Peer E-Records Replication and Storage | 1 | 0.56 | 2001 |
POWER prototype: towards integrated policy-based management | 34 | 3.27 | 2000 |