期刊文献+

移动商务中的隐私保护策略研究综述 被引量:1

下载PDF
导出
摘要 在移动商务环境中,研究隐私策略的统一表示及其执行机制可以有效地解决隐私策略的多样性问题。
出处 《中国电子商务》 2010年第12期264-264,共1页 E-commerce in China
基金 面向隐私保护的移动商务推荐系统研究,国家自然科学基金(项目批准号:70971027)(申请代码:G011203).
  • 相关文献

参考文献3

二级参考文献52

  • 1何再朗,田敬东,张毓森.策略冲突类型的细化及检测方法的改进[J].吉林大学学报(信息科学版),2005,23(3):287-293. 被引量:10
  • 2Halpern J Y, Weissman V. Using first-order logic to reason about policies//Proceedings of the IEEE Computer Security Foundations Workshop. NY, 2003:187-201.
  • 3Damiani E, Di Vimercati S C, Paraboschi S, Samarati P. A fine-grained access control system for XML documents. ACM Transactions on Information and System Security, 2002, 5(2), 169-202.
  • 4Jajodia S, Samarati P, Subrahmanian V S. A logical language for expressing authorizations//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, 1997:31- 43.
  • 5Pucella R, Weissmann V. Reasoning about dynamic policies//Proceedings of FoSSaCS-7, 2004: 453-467.
  • 6Dougherty D J, Fisler K, Krishnamurthi S. Specifying and reasoning about dynamic access-control policies//Bhalla S ed. Lecture Notes in Computer Science 4130. Springer, 2006:632-646.
  • 7DeTreville J. Binder, a logic-based security language//Proceedings of the IEEE Symposium on Security and Privacy. Berkeley, CA, 2002:105- 113.
  • 8Jajodia S, Samarati P, Sapino M L, Subrahmanian V. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 2006, 26(2): 214-260.
  • 9Li N, Mitchell J C, Winsborough W H. Design of a rolebased trust-management framework//Proceedings of the IEEE Symposium on Security and Privacy. Berkeley, CA, 2002:114-130.
  • 10Barker S. Security policy specification in logic//Proceedings of the International Conference on Artificial Intelligence. Las Vegas, Nevada, USA, 2000:143-148.

共引文献101

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部