Sciweavers

30 search results - page 1 / 6
» Meeting privacy obligations: the implications for informatio...
Sort
View
ECIS
2003
13 years 6 months ago
Meeting privacy obligations: the implications for information systems development
The European Union(EU) Data Protection (Privacy) Directive of 1995 (EUPD) and resulting legislation introduced by member states is designed to ensure that business activity is sub...
Reeva M. Lederman, Graeme G. Shanks, Martin R. Gib...
CCS
2006
ACM
13 years 8 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
ER
2008
Springer
136views Database» more  ER 2008»
13 years 6 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
SOCIALCOM
2010
13 years 2 months ago
Failure Feedback for User Obligation Systems
In recent years, several researchers have proposed techniques for providing users with assistance in understanding and overcoming authorization denials. The incorporation of envir...
Murillo Pontual, Keith Irwin, Omar Chowdhury, Will...
CADE
2005
Springer
14 years 5 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin