Trusted computer system evaluation criteria, pp.28-83, 1985. ,
The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1288, 1975. ,
DOI : 10.1109/PROC.1975.9939
Protection, Proceedings of the November 16-18, 1971, fall joint computer conference on, AFIPS '71 (Fall), 1972. ,
DOI : 10.1145/1478873.1478928
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Guide to attribute based access control (ABAC) definition and considerations, NIST Special Publication, vol.800, pp.162-167, 2014. ,
DOI : 10.6028/NIST.SP.800-162
A survey on policy languages in network and security management, Computer Networks, vol.56, issue.1, pp.477-489, 2012. ,
DOI : 10.1016/j.comnet.2011.09.014
Programming Semantics for Multiprogrammed Computations, Communications of the ACM, vol.9, issue.3, pp.365252-365257, 1966. ,
Capability-based addressing, Communications of the ACM, vol.17, issue.7, pp.403-412, 1974. ,
DOI : 10.1145/361011.361070
StarOS, a multiprocessor operating system for the support of task forces, Proceedings of the seventh symposium on Operating systems principles , SOSP '79, p.multics, 1979. ,
DOI : 10.1145/800215.806579
Tahoe-LAFS Distributed Storage Service in Community Network Clouds, Big Data and Cloud Computing (BdCloud), 2014 IEEE Fourth International Conference on. IEEE, p.5, 2014. ,
Safe active content in sanitized JavaScript, Tech. Rep, p.5, 2008. ,
Joe-E : A Security-Oriented Subset of Java, NDSS, vol.10, p.5, 2010. ,
Capability myths demolished, p.5, 2003. ,
The bell-lapadula model, Journal of computer security, vol.42, pp.3-5, 1996. ,
Integrity considerations for secure computer systems. No. MTR-3153- REV-1, MITRE CORP BEDFORD MA, p.5, 1977. ,
Introduction and overview of the Multics system, fall joint computer conference, part I, Proceedings of the, p.5, 1965. ,
A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, p.5, 1987. ,
DOI : 10.1109/SP.1987.10001
A survey of data leakage detection and prevention solutions, 2012. ,
DOI : 10.1007/978-1-4614-2053-8
Detecting data misuse by applying context-based data linkage, Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, 2010. ,
DOI : 10.1145/1866886.1866890
Leakage Prevention Method for Unstructured Data Based on Classification Applications and Techniques in Information Security, pp.2015-337, 2015. ,
A privacy data leakage prevention method in P2P networks Peer-to-Peer Networking and Applications, pp.1-12, 2015. ,
Analyzing group communication for preventing data leakage via email, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, 2011. ,
DOI : 10.1109/ISI.2011.5984047
Preventing information leakage between collaborating organisations, Proceedings of the 10th international conference on Electronic commerce, ICEC '08, 2008. ,
DOI : 10.1145/1409540.1409592
Data Loss Prevention Based on Data-Driven Usage Control, 2012 IEEE 23rd International Symposium on Software Reliability Engineering, 2012. ,
DOI : 10.1109/ISSRE.2012.10
Data usage control enforcement in distributed systems Proceedings of the third ACM conference on Data and application security and privacy, 2013. ,
The UCON ABC usage control model, ACM Transactions on Information and System Security (TISSEC), vol.71, issue.6, pp.128-174, 2004. ,
A Policy Language for Distributed Usage Control Proc, European Symp. Research in Computer Security, pp.531-546, 2007. ,
High Level Conflict Management Strategies in Advanced Access Control Models, Electronic Notes in Theoretical Computer Science, vol.186, pp.3-26, 2007. ,
DOI : 10.1016/j.entcs.2007.01.064
Managing access and flow control requirements in distributed workflows, 2008 IEEE/ACS International Conference on Computer Systems and Applications, p.7, 2008. ,
DOI : 10.1109/AICCSA.2008.4493605
An integrated model for access control and information flow requirements Advances in Computer Science ASIAN 2007. Computer and Network Security, pp.2007111-125, 2007. ,
SANS Mobility/BYOD Security Survey SANS Institute Whitepaper. https://www.sans.org/reading-room/whitepapers/ analyst/cybersecurity-professional-trends-survey, pp.34615-34622, 2012. ,
Network Security Survey Results : Is Network Access Putting You at Risk ? https ,
Michel Riveill : Generation of Transmission Control Rules Compliant with Existing Access Control Policies, Secure- Comm, vol.2015, pp.438-455, 2015. ,
Logical Approaches to Authorization Policies, Logic Programs, Norms and Action, pp.349-373, 2012. ,
DOI : 10.1007/978-3-642-29414-3_19
Unified access control modeling language. New Technologies , Mobility and Security (NTMS), 4th IFIP International Conference on, p.14, 2011. ,
An access control framework for hybrid policies, Proceedings of the 6th International Conference on Security of Information and Networks, SIN '13, pp.282-286, 2013. ,
DOI : 10.1145/2523514.2523549