Sciweavers

181 search results - page 1 / 37
» Analyzing Regulatory Rules for Privacy and Security Requirem...
Sort
View
TSE
2008
128views more  TSE 2008»
13 years 4 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
CSFW
2006
IEEE
13 years 10 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
RE
2002
Springer
13 years 4 months ago
Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy
Privacy has recently become a prominent issue in the context of electronic commerce websites. Increasingly, privacy policies posted on such websites are receiving considerable att...
Annie I. Antón, Julia Brande Earp, Angela R...
ER
2008
Springer
136views Database» more  ER 2008»
13 years 6 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
TRUST
2010
Springer
13 years 9 months ago
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
Virtualization has been purported to be a panacea for many security problems. We analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardw...
Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leend...