ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare
International Journal of Security and Networks
◽
10.1504/ijsn.2013.055943
◽
2013
◽
Vol 8
(2)
◽
pp. 94
◽
Cited By ~ 4
Author(s):
Annanda Thavymony Rath
◽
Jean Noël Colin
Keyword(s):
Control Policy
◽
Usage Control
Download Full-text
Related Documents
Cited By
References
An Architecture for Implementing ’Collaborative Usage Control’ Policy - Toward End-to-End Security Management in Collaborative Computing
Proceedings of the 14th International Conference on Enterprise Information Systems
◽
10.5220/0003967302910294
◽
2012
◽
Keyword(s):
Security Management
◽
Control Policy
◽
Collaborative Computing
◽
Usage Control
◽
End To End
Download Full-text
Model-Based Usage Control Policy Derivation
Lecture Notes in Computer Science - Engineering Secure Software and Systems
◽
10.1007/978-3-642-36563-8_5
◽
2013
◽
pp. 58-74
◽
Cited By ~ 7
Author(s):
Prachi Kumari
◽
Alexander Pretschner
Keyword(s):
Control Policy
◽
Usage Control
◽
Model Based
Download Full-text
Towards a Usage Control Policy Specification with Petri Nets
On the Move to Meaningful Internet Systems: OTM 2009 - Lecture Notes in Computer Science
◽
10.1007/978-3-642-05151-7_11
◽
2009
◽
pp. 905-912
◽
Cited By ~ 4
Author(s):
Basel Katt
◽
Xinwen Zhang
◽
Michael Hafner
Keyword(s):
Petri Nets
◽
Control Policy
◽
Usage Control
◽
Policy Specification
Download Full-text
Enforcement of U-XACML History-Based Usage Control Policy
Security and Trust Management - Lecture Notes in Computer Science
◽
10.1007/978-3-319-46598-2_5
◽
2016
◽
pp. 64-81
◽
Cited By ~ 3
Author(s):
Fabio Martinelli
◽
Ilaria Matteucci
◽
Paolo Mori
◽
Andrea Saracino
Keyword(s):
Control Policy
◽
Usage Control
Download Full-text
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement
IFIP Advances in Information and Communication Technology - Trust Management IV
◽
10.1007/978-3-642-13446-3_5
◽
2010
◽
pp. 63-78
◽
Cited By ~ 10
Author(s):
Gabriela Gheorghe
◽
Stephan Neuhaus
◽
Bruno Crispo
Keyword(s):
Control Policy
◽
Policy Enforcement
◽
Enterprise Service Bus
◽
Usage Control
Download Full-text
Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment
2010 Sixth International Conference on Information Assurance and Security
◽
10.1109/isias.2010.5604060
◽
2010
◽
Cited By ~ 2
Author(s):
Hanieh Azkia
◽
Nora Cuppens-Boulahia
◽
Frederic Cuppens
◽
Gouenou Coatrieux
Keyword(s):
Control Policy
◽
A Posteriori
◽
Usage Control
◽
Healthcare Environment
Download Full-text
Watermarking to Enforce Medical Image Access and Usage Control Policy
2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems
◽
10.1109/sitis.2010.50
◽
2010
◽
Cited By ~ 6
Author(s):
Wei Pan
◽
G Coatrieux
◽
N Cuppens-Boulahia
◽
Fre Cuppens
◽
C Roux
Keyword(s):
Medical Image
◽
Control Policy
◽
Usage Control
◽
Image Access
Download Full-text
Bluetooth Usage Control Policy Enforcement Model
Communications in Computer and Information Science - Emerging Trends and Applications in Information Communication Technologies
◽
10.1007/978-3-642-28962-0_27
◽
2012
◽
pp. 272-283
Author(s):
Shahryar Khan
◽
Inayatullah Babar
Keyword(s):
Control Policy
◽
Policy Enforcement
◽
Usage Control
Download Full-text
Usage Control Policy Enforcement in SDN-Based Clouds: A Dynamic Availability Service Use Case
2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
◽
10.1109/hpcc-smartcity-dss.2016.0087
◽
2016
◽
Cited By ~ 2
Author(s):
Khalifa Toumi
◽
Muhammad Sabir Idrees
◽
Fabien Charmet
◽
Reda Yaich
◽
Gregory Blanc
Keyword(s):
Service Use
◽
Control Policy
◽
Policy Enforcement
◽
Use Case
◽
Usage Control
Download Full-text
A usage control policy specification with Petri nets
Proceedings of the 5th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing
◽
10.4108/icst.collaboratecom2009.8394
◽
2009
◽
Cited By ~ 1
Author(s):
Basel Katt
◽
Michael Hafner
◽
Xinwen Zhang
Keyword(s):
Petri Nets
◽
Control Policy
◽
Usage Control
◽
Policy Specification
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close