메뉴 건너뛰기




Volumn 12, Issue 1, 2004, Pages 8-26

Embedding privacy in IT applications development

Author keywords

Computers; Data security; Privacy

Indexed keywords

COMPUTER CRIME; COMPUTER SOFTWARE; CRYPTOGRAPHY; DATA PRIVACY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION TECHNOLOGY; INTERNET; USER INTERFACES;

EID: 1642275386     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220410518801     Document Type: Article
Times cited : (14)

References (28)
  • 3
    • 85039578158 scopus 로고    scopus 로고
    • Building a privacy guardian for the electronic age
    • IST/PISA project, Deliverable D10
    • Cartrysse, K., Lubbe, J. and Kabasele, J. (2001), "Building a privacy guardian for the electronic age", IST/PISA project, Deliverable D10, available at: http://pet-pisa.openspace.nl/pisa_org/pisa/pisa_project_deliverables.html
    • (2001)
    • Cartrysse, K.1    Lubbe, J.2    Kabasele, J.3
  • 4
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • Chaum, D. (1981), "Untraceable electronic mail, return addresses and digital pseudonyms", Communications of the ACM, Vol. 24 No. 2.
    • (1981) Communications of the ACM , vol.24 , Issue.2
    • Chaum, D.1
  • 5
    • 9144236670 scopus 로고
    • Showing credentials without identification transferring signatures between unconditionally un-linkable pseudonyms
    • Chaum, D. (1990), "Showing credentials without identification transferring signatures between unconditionally un-linkable pseudonyms", Advances in Cryptology (USCRYPT '90), January.
    • (1990) Advances in Cryptology (USCRYPT '90), January
    • Chaum, D.1
  • 6
    • 84866820721 scopus 로고    scopus 로고
    • The legal context of privacy-enhancing and privacy-sympathetic technologies
    • The Australian National University
    • Clarke, R. (2001), "The legal context of privacy-enhancing and privacy-sympathetic technologies", The Australian National University, available at: www.anu.edu.au/people/Roger.Clarke/DV/Florham.html
    • (2001)
    • Clarke, R.1
  • 8
    • 0006917446 scopus 로고    scopus 로고
    • Internet privacy
    • Cranor, L. (1999), "Internet privacy", Communications of the ACM, Vol. 42 No. 2, pp. 29-66.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 29-66
    • Cranor, L.1
  • 9
    • 85039588266 scopus 로고
    • August, Data Protection Commission of The Netherlands
    • Data Protection Commission of The Netherlands (1995), Privacy-Enhancing Technologies: The Path to Anonymity, Vol. 2, August, Data Protection Commission of The Netherlands.
    • (1995) Privacy-Enhancing Technologies: The Path to Anonymity , vol.2
  • 10
    • 0000964378 scopus 로고    scopus 로고
    • Flood control on the information ocean: Living with anonymity, digital cash and distributed databases
    • Froomkin, M. (1996), "Flood control on the information ocean: living with anonymity, digital cash and distributed databases", Pittsburgh Journal of Law and Commerce, p. 395.
    • (1996) Pittsburgh Journal of Law and Commerce , pp. 395
    • Froomkin, M.1
  • 11
    • 54649083230 scopus 로고    scopus 로고
    • TAZ servers and the rewebber network: Enabling anonymous publishing on the WWW
    • Goldberg, I. and Wagner, D. (1998), "TAZ servers and the rewebber network: enabling anonymous publishing on the WWW", First Monday Peer Reviewed Journal on The Internet, Vol. 3, No. 4.
    • (1998) First Monday Peer Reviewed Journal on The Internet , vol.3 , Issue.4
    • Goldberg, I.1    Wagner, D.2
  • 13
    • 85039581624 scopus 로고    scopus 로고
    • Secure deletion of data from magnetic and solid-state memory
    • Goodman, P. (1996), "Secure deletion of data from magnetic and solid-state memory", Proceedings of the USENIX Security Symposium, USA, available at: www.usenix.org/publications/library/proceedings/sec96/full_papers/gutmann/
    • (1996) Proceedings of the USENIX Security Symposium, USA
    • Goodman, P.1
  • 15
    • 0043249777 scopus 로고    scopus 로고
    • Securing the electronic market: The KEYSTONE public key infrastructure architecture
    • Gritzalis, S., Katsikas, S., Lekkas, D., Moulinos, K. and Polydorou, E. (2000), "Securing the electronic market: the KEYSTONE Public Key Infrastructure architecture", Computers & Security, Vol. 19 No. 8, pp. 731-46.
    • (2000) Computers & Security , vol.19 , Issue.8 , pp. 731-746
    • Gritzalis, S.1    Katsikas, S.2    Lekkas, D.3    Moulinos, K.4    Polydorou, E.5
  • 16
    • 85039584388 scopus 로고
    • August
    • Information and Privacy Commission (1995), Privacy-Enhancing Technologies: The Path to Anonymity, Vol. 1, August, Information and Privacy Commission, Ontario, available at: www.ipc.on.ca/english/pubpres/papers/anon-e.htm
    • (1995) Privacy-Enhancing Technologies: The Path to Anonymity , vol.1
  • 17
    • 3242742592 scopus 로고    scopus 로고
    • Addressing anonymous messages in cyberspace
    • June
    • Lee, G. (1996), "Addressing anonymous messages in cyberspace", Journal of Computer-Mediated Communication, Vol. 2, June, available at: www.ascusc.org/jcmc/vol2/issue1/anon.html
    • (1996) Journal of Computer-Mediated Communication , vol.2
    • Lee, G.1
  • 19
    • 85039568774 scopus 로고    scopus 로고
    • Employee privacy in the electronic workplace, Part 1: Surveillance, records and emails
    • December
    • Nolan, J. (2000), "Employee privacy in the electronic workplace, part 1: surveillance, records and emails", Privacy Law and Policy Reporter, December, available at: www.austlii.edu.au/au/journals/PLPR/2000/51.html
    • (2000) Privacy Law and Policy Reporter
    • Nolan, J.1
  • 26
    • 85039580665 scopus 로고    scopus 로고
    • Information privacy in Australia
    • July
    • Scollay, M. (1997), "Information privacy in Australia", Privacy Law & Policy Reporter, July, available at: www.austilii.edu.au/au/journals/PLPR/1997/36.html
    • (1997) Privacy Law & Policy Reporter
    • Scollay, M.1
  • 28
    • 85039577349 scopus 로고    scopus 로고
    • Privacy recommendations for financial services: Contrasting the Australian and Canadian approaches
    • January
    • Tuker, G. (1999), "Privacy recommendations for financial services: contrasting the Australian and Canadian approaches", Privacy Law & Policy Reporter, January, available at: www.austlii.edu.au/au/journals/PLPR/1999/5.html
    • (1999) Privacy Law & Policy Reporter
    • Tuker, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.