Privacy and Freedom, 1967. ,
The semantic web will build in privacy, 2009. ,
The PING Personally Controlled Electronic Medical Record System: Technical Architecture, Journal of the American Medical Informatics Association, vol.12, issue.1, pp.45-54, 2005. ,
DOI : 10.1197/jamia.M1592
P3P: making privacy policies more useful, IEEE Security & Privacy Magazine, vol.1, issue.6, pp.50-55, 2003. ,
DOI : 10.1109/MSECP.2003.1253568
Unification in privacy policy evaluation - translating EPAL into Prolog, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., pp.185-188, 2004. ,
DOI : 10.1109/POLICY.2004.1309165
Limiting Disclosure in Hippocratic Databases, pp.108-119, 2004. ,
DOI : 10.1016/B978-012088469-8.50013-9
A comparison of two privacy policy languages, Proceedings of the 3rd ACM workshop on Secure web services , SWS '06, pp.53-60, 2006. ,
DOI : 10.1145/1180367.1180378
Privacy-aware role based access control, In: SACMAT, pp.41-50, 2007. ,
DOI : 10.1109/msp.2009.102
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.566
Privacy-Aware Role-Based Access Control, IEEE Security & Privacy Magazine, vol.7, issue.4, pp.35-43, 2009. ,
DOI : 10.1109/MSP.2009.102
Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006. ,
DOI : 10.1109/SP.2006.32
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.1610
Fibring logics, 1999. ,
The next 700 access control models or a unifying meta-model?, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.187-196, 2009. ,
DOI : 10.1145/1542207.1542238
A Meta-model of Access Control in a Fibred Security Language, Studia Logica, vol.149, issue.1, pp.437-477, 2009. ,
DOI : 10.1007/s11225-009-9203-4
Authentication in distributed systems: theory and practice, ACM Transactions on Computer Systems, vol.10, issue.4, pp.265-310, 1992. ,
DOI : 10.1145/138873.138874
Delegation logic, ACM Transactions on Information and System Security, vol.6, issue.1, pp.128-171, 2003. ,
DOI : 10.1145/605434.605438
FSL ? fibred security language, Normative Multi-Agent Systems. Number 09121 in Dagstuhl Seminar Proceedings, 2009. ,
A calculus for access control in distributed systems, ACM Transactions on Programming Languages and Systems, vol.15, issue.4, pp.706-734, 1993. ,
DOI : 10.1145/155183.155225
Modal logic an introduction, 1980. ,
Many-Dimensional Modal Logics: Theory and Applications, 2003. ,
Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.102-110, 2005. ,
DOI : 10.1145/1063979.1063998
Status-Based Access Control, ACM Transactions on Information and System Security, vol.12, issue.1, 2008. ,
DOI : 10.1145/1410234.1410235
Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001. ,
DOI : 10.1145/383891.383894
IT-Security and Privacy, 2001. ,
DOI : 10.1007/3-540-45150-1