Towards a policy enforcement infrastructure for distributed usage control, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.119-122 ,
DOI : 10.1145/2295136.2295159
URL : https://www22.in.tum.de/fileadmin/papers/sacmat12.pdf
Distributed data usage control for web applications, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, p.11 ,
DOI : 10.1145/1943513.1943526
A Policy Language for Distributed Usage Control, Proc. ESORICS, pp.531-546, 2007. ,
DOI : 10.1007/978-3-540-74835-9_35
Mechanisms for usage control, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.240-245, 2008. ,
DOI : 10.1145/1368310.1368344
URL : http://www.inf.ethz.ch/personal/basin/pubs/asiaccs08.pdf
Representation-Independent Data Usage Control, Proc. 6th Intl. Workshop on Data Privacy Management, 2011. ,
DOI : 10.1007/978-3-642-28879-1_9
Deriving implementation-level policies for usage control enforcement, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.83-94, 2012. ,
DOI : 10.1145/2133601.2133612
URL : https://www.researchgate.net/profile/Prachi_Kumari/publication/254007385_Deriving_implementation-level_policies_for_usage_control_enforcement/links/53e4cb120cf25d674e94ec95.pdf
Model-Based Usage Control Policy Derivation, Proc. ESSOS 2013, pp.58-74 ,
DOI : 10.1007/978-3-642-36563-8_5
URL : https://www22.in.tum.de/fileadmin/papers/essos13.pdf
Deliverable 3.2 policy specification methodology, 2014. ,
Privacy wizards for social networking sites, Proceedings of the 19th international conference on World wide web, WWW '10, pp.351-360, 2010. ,
DOI : 10.1145/1772690.1772727
URL : http://www.eecs.umich.edu/%7Eklefevre/Publications_files/www2010.pdf
Data Loss Prevention Based on Data-Driven Usage Control, 2012 IEEE 23rd International Symposium on Software Reliability Engineering, pp.151-160, 2012. ,
DOI : 10.1109/ISSRE.2012.10
Automated decomposition of access control policies, Proc. POLICY 2005, pp.6-8 ,
A goal-based approach to policy refinement, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., pp.229-239, 2004. ,
DOI : 10.1109/POLICY.2004.1309175
URL : http://oro.open.ac.uk/6892/01/01309175.pdf
Decomposition techniques for policy refinement, 2010 International Conference on Network and Service Management, pp.72-79, 2010. ,
DOI : 10.1109/CNSM.2010.5691331
URL : http://www.doc.ic.ac.uk/~rac101/papers/cnsm.pdf
A Classification-Based Approach to Policy Refinement, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007. ,
DOI : 10.1109/INM.2007.374713
Ontology-Based Policy Refinement Using SWRL Rules for Management Information Definitions in OWL, DSOM, pp.227-232, 2006. ,
DOI : 10.1007/978-3-540-30504-0_10
State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition, 2009 Third International Conference on Network and System Security, pp.373-380, 2009. ,
DOI : 10.1109/NSS.2009.51
Usage control enforcement with data flow tracking for x11, Proc. STM 2009, pp.124-137 ,
Data Protection in Heterogeneous Distributed Systems: A Smart Meter Example, DSCI, 2011. ,
Model-based specification and refinement of usage control policies, 2013 Eleventh Annual Conference on Privacy, Security and Trust, pp.169-176 ,
DOI : 10.1109/PST.2013.6596051