Cited By
View all- Sion RWinslett M(2010)Regulatory ComplianceHandbook of Financial Cryptography and Security10.1201/9781420059823-c19(555-584)Online publication date: 4-Aug-2010
Web 2.0 introduces new breaches in the privacy protection of personal data. Most of the users of such Internet media are not aware about the risks of publishing personal information. These threats can lead to identity thefts, scams, and cyber criminal ...
This paper is part of a project investigating authorization systems that assign obligations to users. We are particularly interested in obligations that require authorization to be performed and that, when performed, may modify the authorization state. ...
Obligations are an essential element of security policies since they enable the specification of many security requirements such as availability, privacy, usage control and data protection. In everyday life, the fulfillment of obligations is often the ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in