Representing Security Policies in Web Information Systems (original) (raw)
Related papers
Handbook of Research on Information Security and Assurance
Modelling and Deploying Security Policies
Proceedings of the Fifth International Conference on Web Information Systems and Technologies, 2009
Security Patterns, Towards a Further Level
Proceedings of the International Conference on Security and Cryptography, 2009
Parameters and Guidelines of Enforceable Information Security Management Systems
Interdisciplinary Description of Complex Systems, 2019
Principles and Practices of Network Security
Zenodo (CERN European Organization for Nuclear Research), 2023
Security Policy Framework and Algorithms for Web Server Content Protection
2007
Representation of Security and Dependability Solutions
Security and Dependability for Ambient Intelligence, 2009
An advanced policy based authorisation infrastructure
Proceedings of the 5th ACM workshop on Digital identity management, 2009
A Composite Framework for Behavioral Compliance with Information Security Policies
2012
Human factors, security and safety
2009
Abstracting application-level web security
Proceedings of the eleventh international conference on World Wide Web - WWW '02, 2002
Secure Web Applications: A Systematic Approach
Sam, 2007
The Security Challenges Emerging from the Technological Developments
Mobile Networks and Applications, 2019
Software Engineering Techniques Applied to AmI: Security Patterns
Developing Ambient Intelligence
Flexible service offering with semantic policies
2008
The Patterns for Information System Security
Proceedings of the 11th International Conference on Enterprise Information
Model-Driven Development of a Web Service-Oriented Architecture and Security Policies
2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010
A Model-Based Framework for Security Policy Specification, Deployment and Testing
Model Driven Engineering Languages and Systems, 2008
Redefining security in the Middle East
2002
Closing the protection gap article IHRLR
Specification and Enforcement of Dynamic Authorization Policies Oriented by Situations
2014 6th International Conference on New Technologies, Mobility and Security (NTMS), 2014
Applied Aspects of Information Technology
Lubomyr (Любомир) Petryshyn (Петришин)
OSCE Mediterranean seminar on the human dimension of security
1999
Global Preventive Security and its unbearable lightness
HAL (Le Centre pour la Communication Scientifique Directe), 2014
BMJ, 1985
How to Specify Security Services: A Practical Approach
Lecture Notes in Computer Science, 2003
The Policy Machine for Security Policy Management
Lecture Notes in Computer Science, 2001
Journal of Public Affairs Education, 2018
Developing a Secure Web Application Using OWASP Guidelines
Computer and Information …, 2009
Information security policy compliance model in organizations
Computers & Security, 2016
Synthesis lectures on engineers, technology, and society, 2024
Data Quality for Security Challenges
2019
From Security Protocols to Systems Security
Lecture Notes in Computer Science, 2005
Developing a Security Typed Java Servlet
2008 The Fourth International Conference on Information Assurance and Security, 2008
Two-component model of security inspection: application and findings
2006