REFERENCES
Anderson, A. (2005). Core and hierarchical role based ac-
cess control (rbac) profile of xacml v2.0. OASIS Stan-
dard.
Bera, C. and Denker, M. (2013). Towards a flexible Pharo
Compiler. In Lagadec, L. and Plantec, A., editors,
IWST, Annecy, France. ESUG.
Bonatti, P., Galdi, C., and Torres, D. (2013). ERBAC:
Event-driven RBAC. In Proceedings of the 18th ACM
Symposium on Access Control Models and Technolo-
gies, SACMAT ’13, pages 125–136, New York, NY,
USA. ACM.
Ferrari, M., Ferrari, G., Clague, K., Brown, J., and Hempel,
R. (2003). LEGO Mindstorm Masterpieces: Building
and Programming Advanced Robots. Syngress.
Fowler, M. (2004). UML Distilled: A Brief Guide to
the Standard Object Modeling Language. Addison-
Wesley Professional.
Hammond, T. and Davis, R. (2005). LADDER, a sketching
language for user interface developers. Computers &
Graphics, 29(4):518–532.
Malan, D. J. and Leitner, H. H. (2007). Scratch for bud-
ding computer scientists. In Proceedings of the 38th
SIGCSE Technical Symposium on Computer Science
Education, SIGCSE ’07, pages 223–227, New York,
NY, USA. ACM.
Matheus, A. and Herrmann, J. (2008). Geospatial extensi-
ble access control markup language (geoxacml). Open
Geospatial Consortium Inc.
Moses, T. (2005). eXtensible Access Control Markup Lan-
guage (XACML) Version 2.0. OASIS Standard.
Resnick, M., Maloney, J., Monroy-Hernández, A., Rusk,
N., Eastmond, E., Brennan, K., Millner, A., Rosen-
baum, E., Silver, J., Silverman, B., and Kafai, Y.
(2009). Scratch: Programming for all. Commun.
ACM, 52(11):60–67.
Roy, K. (2012). App inventor for android: Report from
a summer camp. In Proceedings of the 43rd ACM
Technical Symposium on Computer Science Educa-
tion, SIGCSE ’12, pages 283–288, New York, NY,
USA. ACM.
Stepien, B., Felty, A., and Matwin, S. (2009). A non-
technical user-oriented display notation for xacml
conditions. In Babin, G., Kropf, P., and Weiss, M., ed-
itors, E-Technologies: Innovation in an Open World,
volume 26 of Lecture Notes in Business Information
Processing, pages 53–64. Springer Berlin Heidelberg.
Stepien, B., Matwin, S., and Felty, A. (2011). Advantages
of a non-technical XACML notation in role-based
models. In 2011 Ninth Annual International Confer-
ence on Privacy, Security and Trust (PST), pages 193–
200.
Twidle, K., Dulay, N., Lupu, E., and Sloman, M. (2009).
Ponder2: A policy system for autonomous pervasive
environments. In Fifth International Conference on
Autonomic and Autonomous Systems, 2009. ICAS ’09,
pages 330–335.
Ulltveit-Moe, N. and Oleshchuk, V. Mobile security with
location-aware role-based access control. In Secu-
rity and Privacy in Mobile Information and Com-
munication Systems, volume 94 of Lecture Notes of
the Institute for Computer Sciences, Social Informat-
ics and Telecommunications Engineering. Springer
Berlin Heidelberg.
Ulltveit-Moe, N. and Oleshchuk, V. (2012). Decision-
cache based XACML authorisation and anonymisa-
tion for XML documents. Comput. Stand. Interfaces,
34(6):527–534.
Ulltveit-Moe, N. and Oleshchuk, V. (2013). Enforcing
mobile security with location-aware role-based ac-
cess control. Security and Communication Networks,
pages 172–183.
Ulltveit-Moe, N. and Oleshchuk, V. (2015). A novel
policy-driven reversible anonymisation scheme for
xml-based services. Information Systems, 48(0):164
– 178.
Zhao, H., Lobo, J., and Bellovin, S. (2008). An algebra
for integration and analysis of ponder2 policies. In
IEEE Workshop on Policies for Distributed Systems
and Networks, 2008., pages 74–77.
ICISSP2015-1stInternationalConferenceonInformationSystemsSecurityandPrivacy
190