Privacy and contextual integrity: Framework and applications

A Barth, A Datta, JC Mitchell… - 2006 IEEE symposium …, 2006 - ieeexplore.ieee.org
Contextual integrity is a conceptual framework for understanding privacy expectations and
their implications developed in the literature on law, public policy, and political philosophy …

Verification and change-impact analysis of access-control policies

K Fisler, S Krishnamurthi, LA Meyerovich… - Proceedings of the 27th …, 2005 - dl.acm.org
Sensitive data are increasingly available on-line through the Web and other distributed
protocols. This heightens the need to carefully control access to data. Control means not …

Will my patch make it? and how fast? case study on the linux kernel

Y Jiang, B Adams, DM German - 2013 10th Working …, 2013 - ieeexplore.ieee.org
The Linux kernel follows an extremely distributed reviewing and integration process
supported by 130 developer mailing lists and a hierarchy of dozens of Git repositories for …

Specifying and reasoning about dynamic access-control policies

DJ Dougherty, K Fisler, S Krishnamurthi - International Joint Conference …, 2006 - Springer
Access-control policies have grown from simple matrices to non-trivial specifications written
in sophisticated languages. The increasing complexity of these policies demands …

A comparison of two privacy policy languages: EPAL and XACML

AH Anderson - Proceedings of the 3rd ACM workshop on Secure web …, 2006 - dl.acm.org
Current regulatory requirements in the US and other countries make it increasingly important
for Web Services to be able to enforce and verify their compliance with privacy policies …

Towards the development of privacy-aware systems

P Guarda, N Zannone - Information and Software Technology, 2009 - Elsevier
Privacy and data protection are pivotal issues in nowadays society. They concern the right to
prevent the dissemination of sensitive or confidential information of individuals. Many …

XACML policy integration algorithms

P Mazzoleni, B Crispo, S Sivasubramanian… - ACM Transactions on …, 2008 - dl.acm.org
XACML is the OASIS standard language specifically aimed at the specification of
authorization policies. While XACML fits well with the security requirements of a single …

Privacy APIs: Access control techniques to analyze and verify legal privacy policies

MJ May, CA Gunter, I Lee - 19th IEEE Computer Security …, 2006 - ieeexplore.ieee.org
There is a growing interest in establishing rules to regulate the privacy of citizens in the
treatment of sensitive personal data such as medical and financial records. Such rules must …

Analysis of XACML policies with SMT

F Turkmen, J Den Hartog, S Ranise… - … 2015, Held as Part of the …, 2015 - Springer
Abstract The eXtensible Access Control Markup Language (XACML) is an extensible and
flexible XML language for the specification of access control policies. However, the richness …

Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

F Massacci, M Prest, N Zannone - Computer Standards & Interfaces, 2005 - Elsevier
Extending Requirements Engineering modelling and formal analysis methodologies to cope
with Security Requirements has been a major effort in the past decade. Yet, only few works …