From post

Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services.

, , и . DEXA Workshops, стр. 377-382. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The HP time vault service: exploiting IBE for timed release of confidential information., , и . WWW, стр. 160-169. ACM, (2003)Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography., , и . STA Workshops, том 187 из Communications in Computer and Information Science, стр. 166-173. Springer, (2011)Semantic Generation of Clouds Privacy Policies., , , и . CLOSER (Selected Papers), том 512 из Communications in Computer and Information Science, стр. 15-30. Springer, (2014)Automating Compliance for Cloud Computing Services., , , и . CLOSER, стр. 631-637. SciTePress, (2012)Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information., и . InfraSec, том 2437 из Lecture Notes in Computer Science, стр. 59-72. Springer, (2002)A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises., , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 91-102. Springer, (2006)Multi-Agent Reinforcement Learning for Maritime Operational Technology Cyber Security., , , , , , и . CoRR, (2024)ReasONets: a fuzzy-based approach for reasoning on network incidents., , , и . CCS, стр. 1010-1012. ACM, (2012)An Adaptive Privacy Management System for Data Repositories., и . TrustBus, том 3592 из Lecture Notes in Computer Science, стр. 236-245. Springer, (2005)Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes., и . POLICY, стр. 137-140. IEEE Computer Society, (2011)