The widespread diffusion of the Internet as the platform for accessing distributed services makes available a huge amount of personal data, and a corresponding concern and demand from users, as well as legislation, for solutions providing users with form of control on their data. Responding to this requirement raises the emerging need of solutions supporting proper information security governance, allowing enterprises managing user information to enforce restrictions on information acquisition as well as its processing and secondary use. While the research community has acknowledged this emerging scenario, and research efforts are being devoted to it, current technologies provide still limited solutions to the problem. In this paper, we ...
The use of personal, sensitive information, such as privileges and attributes, to gain access to com...
Access control and authentication systems are currently undergoing a paradigm shift towards openness...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
Some software applications are developed to collect, store, and manage users\u27 personal, medical, ...
In this paper we describe extensions to the access control industry standards XACML and SAML to enab...
The use of personal, sensitive information, such as privileges and attributes, to gain access to com...
The use of personal, sensitive information, such as privileges and attributes, to gain access to com...
This chapter presents the results of the research on how the current standards for access control po...
In the next few years, we will see the upcoming of location-based services. Such LBSs will be extrem...
Attribute-based access control (ABAC) is a very powerful and flexible security technique making it p...
Current proposals for access control languages cannot specify policies required by specific applicat...
We conduct more and more of our daily interactions over electronic media. The EC-funded project PRIM...
Nowadays many organisations share sensitive services through open network systems and this raises th...
The use of personal, sensitive information, such as privileges and attributes, to gain access to com...
Access control and authentication systems are currently undergoing a paradigm shift towards openness...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
Some software applications are developed to collect, store, and manage users\u27 personal, medical, ...
In this paper we describe extensions to the access control industry standards XACML and SAML to enab...
The use of personal, sensitive information, such as privileges and attributes, to gain access to com...
The use of personal, sensitive information, such as privileges and attributes, to gain access to com...
This chapter presents the results of the research on how the current standards for access control po...
In the next few years, we will see the upcoming of location-based services. Such LBSs will be extrem...
Attribute-based access control (ABAC) is a very powerful and flexible security technique making it p...
Current proposals for access control languages cannot specify policies required by specific applicat...
We conduct more and more of our daily interactions over electronic media. The EC-funded project PRIM...
Nowadays many organisations share sensitive services through open network systems and this raises th...
The use of personal, sensitive information, such as privileges and attributes, to gain access to com...
Access control and authentication systems are currently undergoing a paradigm shift towards openness...
In this article, we introduce a comprehensive framework supporting a privacy-aware access control me...