Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy and contextual integrity: Framework and applications
Contextual integrity is a conceptual framework for understanding privacy expectations and
their implications developed in the literature on law, public policy, and political philosophy …
their implications developed in the literature on law, public policy, and political philosophy …
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed
protocols. This heightens the need to carefully control access to data. Control means not …
protocols. This heightens the need to carefully control access to data. Control means not …
Will my patch make it? and how fast? case study on the linux kernel
The Linux kernel follows an extremely distributed reviewing and integration process
supported by 130 developer mailing lists and a hierarchy of dozens of Git repositories for …
supported by 130 developer mailing lists and a hierarchy of dozens of Git repositories for …
Specifying and reasoning about dynamic access-control policies
Access-control policies have grown from simple matrices to non-trivial specifications written
in sophisticated languages. The increasing complexity of these policies demands …
in sophisticated languages. The increasing complexity of these policies demands …
A comparison of two privacy policy languages: EPAL and XACML
AH Anderson - Proceedings of the 3rd ACM workshop on Secure web …, 2006 - dl.acm.org
Current regulatory requirements in the US and other countries make it increasingly important
for Web Services to be able to enforce and verify their compliance with privacy policies …
for Web Services to be able to enforce and verify their compliance with privacy policies …
Towards the development of privacy-aware systems
Privacy and data protection are pivotal issues in nowadays society. They concern the right to
prevent the dissemination of sensitive or confidential information of individuals. Many …
prevent the dissemination of sensitive or confidential information of individuals. Many …
XACML policy integration algorithms
P Mazzoleni, B Crispo, S Sivasubramanian… - ACM Transactions on …, 2008 - dl.acm.org
XACML is the OASIS standard language specifically aimed at the specification of
authorization policies. While XACML fits well with the security requirements of a single …
authorization policies. While XACML fits well with the security requirements of a single …
Privacy APIs: Access control techniques to analyze and verify legal privacy policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the
treatment of sensitive personal data such as medical and financial records. Such rules must …
treatment of sensitive personal data such as medical and financial records. Such rules must …
Analysis of XACML policies with SMT
Abstract The eXtensible Access Control Markup Language (XACML) is an extensible and
flexible XML language for the specification of access control policies. However, the richness …
flexible XML language for the specification of access control policies. However, the richness …
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
Extending Requirements Engineering modelling and formal analysis methodologies to cope
with Security Requirements has been a major effort in the past decade. Yet, only few works …
with Security Requirements has been a major effort in the past decade. Yet, only few works …