Design of a Policy based Privacy Protection System using Encryption Techniques
![]() |
Mun Hyung-Jin
(Chungbuk University)
Li Yong-Zhen (Chungbuk University) Lee Dong-Heui (Keukdong College) Lee Sang-Ho (Chungbuk University) Lee Keon-Myung (Chungbuk University) |
1 | W. Stallings, Cryptography and Network Security, ISBN 0-13-091429-0 |
2 | W.k. Huan, and V. Atluri, 'Secure-Flow : A secure Web-enabled Workflow Management System,' Proc. of 4th ACM Workshop on Role-based Access Control, 1999 |
3 | OASIS, eXtensible Access Control Markup Language(XACML) version 2.0. OASIS, Feb. 2005 |
4 | S. Oh, and S. Park, 'A Process of Abstracting T-RBAC Aspects from Enterprise Environment,' DASFAA'01. April.2001 |
5 | R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, 'Role- Based Access Control Models,' IEEE Computer, Vol29, No2, pp38-47. 1996 |
6 | P.K.Thomas, and R.S.Sandhu, 'Task-based Authorization Control(TBAC) : A Family of Models for Active and Enterprise-oriented Authorization Management,' Proc of the IFIP WG11.3 Workshop on Database Security. 1997 |
7 | W3C, Platform for Privacy Preference(P3P) version1.1, http://www.w3c.org/P3P |
8 | M.C. Mont, S. Pearson, and P. Bramhall., 'An Adaptive Privacy Management System For Data Repositories,' http://www.hpl.hp.com/techre ports/2004/HPL-2004 -211.html |
9 | S. Oh, and S. Park, 'An Integration Model of Role-based Access Control and Activity-based Access Control Using Task,' Proc. of 14th Annual IFIP WG11.3 Working Conference on Database Security, Aug. April. 2000 |
![]() |