From post

Enhancing Accountability in the Cloud via Sticky Policies.

, , и . STA Workshops, том 187 из Communications in Computer and Information Science, стр. 146-155. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automating Compliance for Cloud Computing Services., , , и . CLOSER, стр. 631-637. SciTePress, (2012)Semantic Generation of Clouds Privacy Policies., , , и . CLOSER (Selected Papers), том 512 из Communications in Computer and Information Science, стр. 15-30. Springer, (2014)Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography., , и . STA Workshops, том 187 из Communications in Computer and Information Science, стр. 166-173. Springer, (2011)The HP time vault service: exploiting IBE for timed release of confidential information., , и . WWW, стр. 160-169. ACM, (2003)Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information., и . InfraSec, том 2437 из Lecture Notes in Computer Science, стр. 59-72. Springer, (2002)A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises., , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 91-102. Springer, (2006)ReasONets: a fuzzy-based approach for reasoning on network incidents., , , и . CCS, стр. 1010-1012. ACM, (2012)An Adaptive Privacy Management System for Data Repositories., и . TrustBus, том 3592 из Lecture Notes in Computer Science, стр. 236-245. Springer, (2005)Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes., и . POLICY, стр. 137-140. IEEE Computer Society, (2011)Position paper: Rule Language Requirement for Privacy-Enabled Identity Management., , , и . Rule Languages for Interoperability, W3C, (2005)