EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Project: PAW: Privacy in an Ambient World
Home Policy Brochure Browse Search User Area Contact Help

2009

Dekker, M.A.C. (2009) Flexible Access Control for Dynamic Collaborative Environments. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-159 ISBN 978-90-365-2950-1

2008

Dekker, M.A.C. and Crampton, J. and Etalle, S. (2008) RBAC administration in distributed systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, 11-13 June 2008, Estes Park, Colorado, USA. pp. 93-102. ACM. ISBN 978-1-60558-129-3

2007

Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2007) Audit-based compliance control. International Journal of Information Security, 6 (2-3). pp. 133-151. ISSN 1615-5262 *** ISI Impact 1,279 ***
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2007) Extended Privilege Inheritance in RBAC. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security, ASIACCS 2007, March 20-22, Singapore. pp. 383-385. Conference on Computer and Communications Security. ACM Press. ISBN 1-59593-574-6
Dekker, M.A.C. and Crampton, J. and Etalle, S. (2007) RBAC Administration in Distributed Systems. Technical Report TR-CTIT-07-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. Technical Report TR-CTIT-07-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. In: Proceedings of the fourth VLDB Workshop, SDM 2007, 23, 24 Sept 2007, Vienna, Austria. pp. 33-46. Lecture Notes in Computer Science 4721. Springer. ISBN 978-3-540-75247-9
Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2007) Privacy Policies. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 383-397. ISBN 978-3-540-69860-9
Dekker, M.A.C. and den Hartog, J.I. and Etalle, S. (2007) Audit-based Compliance Control (AC2) for EHR Systems. Technical Report TR-CTIT-07-46, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2006

Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2006) The Audit Logic: Policy Compliance in Distributed Systems. Technical Report TR-CTIT-06-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. (2006) Analysis Models for Security Protocols. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 05-76 ISBN 90-365-2279-X
Corin, R.J. and Galindo, D. and Hoepman, J.H. (2006) Securing data accountability in decentralized systems. In: Proceedings of 1st International Workshop on Information Security, IS'06, 30 Oct - 3 Nov 2006, Montpellier, France. pp. 626-635. Lecture Notes in Computer Science 4277. Springer. ISBN 978-3-540-48269-7
Corin, R.J. and den Hartog, J.I. (2006) A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs. In: ICALP 2006 track C, 9-13 Jul 2006, Venice, Italy. pp. 252-263. Lecture Notes in Computer Science 4052. Springer-Verlag. ISBN 3-540-35907-9
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2006) A Logic for Constraint-based Security Protocol Analysis. In: IEEE Symposium on Security and Privacy, 21-25 May 2006, Oakland, US. pp. 155-168. IEEE Computer Society. ISBN 0-7695-2574-1
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-06-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-07-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. Technical Report TR-CTIT-06-49, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. In: Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA), 16-17 Sept 2006, Bertinoro, Italy. pp. 221-236. Elsevier Electronic Notes in Theoretical Computer Science 168. Elsevier. ISSN 1571-0661
Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2006) Privacy in an Ambient World. Technical Report TR-CTIT-06-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Veugen, P.J.M. and Etalle, S. (2006) Audit-based Access Control in de Zorg. Informatiebeveiliging, 8. pp. 19-23. ISSN 1569-1063

2005

Cederquist, J.G. and Corin, R.J. and Torabi Dashti, M. (2005) On the quest for impartiality: Design and analysis of a Fair Non-repudiation protocol. In: 7th International Conference on Information and Communications Security, ICICS 2005, 10-13 Dec 2005, Beijing, China. pp. 27-39. Lecture Notes in Computer Science 3783. Springer-Verlag. ISBN 3-540-30934-9
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A Formal Security Analysis of an OSA/Parlay Authentication Interface. In: 7th IFIP WG 6.1 Int. Conf. on Formal Methods for Open Object-Based Distributed Systems (FMOODS), Athens, Greece. pp. 131-146. Springer-Verlag. ISBN 3-540-26181-8
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2005) PS-LTL for Constraint-Based Security Protocol Analysis. In: Logic Programming, 21st International Conference, ICLP 2005, October 2-5, 2005, Sitges, Spain. pp. 439-440. Electronic Notes in Theoretical Computer Science 3668. Springer Verlag. ISBN 3-540-29208-X

2004

Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security Analysis of Parlay/OSA Framework. In: 9th Int. Conf. on Intelligence in service delivery Networks ICIN, Bordeaux, France. pp. 54-59. IOS Press.
Corin, R.J. and Etalle, S. and den Hartog, J.I. and Lenzini, G. and Staicu, I.S. (2004) A Logic for Auditing Accountability in Decentralized Systems. In: 2nd Int. Workshop on Formal Aspect of Security and Trust (FAST), Toulouse, France. pp. 187-201. Springer-Verlag. ISBN 0-387-24050-0