-
2
-
-
33847732821
-
-
Online
-
AMBer (2003). Network Associates' AMBer Project. Online: http://www.networkassociates.com/us/nailabs/research_projects/ security_infrastructure/amber.asp.
-
(2003)
Network Associates' AMBer Project
-
-
AMBer1
-
4
-
-
4544319327
-
Providing privacy for Web services by anonymous group identification
-
6-9 July
-
Cattaneo, G., Faruolo, P., Petrillo, U. F., & Persiano, G. (2004). Providing privacy for Web services by anonymous group identification. In Proceedings of the IEEE International Conference on Web Services (ICWS) (pp. 166-173, 6-9 July).
-
(2004)
Proceedings of the IEEE International Conference on Web Services (ICWS)
, pp. 166-173
-
-
Cattaneo, G.1
Faruolo, P.2
Petrillo, U.F.3
Persiano, G.4
-
6
-
-
84969556103
-
A data-driven methodology to extending workflows across organizations over the internet
-
CDROM, 10 pages, Jan
-
Cheung, S. C., Chiu, D. K. W., & Till, S. (2003). A data-driven methodology to extending workflows across organizations over the internet. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS), CDROM, 10 pages, Jan.
-
(2003)
Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS)
-
-
Cheung, S.C.1
Chiu, D.K.W.2
Till, S.3
-
7
-
-
33847729629
-
CIBC's privacy practices failed in cases of misdirected faxes
-
CIBC , Online
-
CIBC (2005). CIBC's privacy practices failed in cases of misdirected faxes. In Office of the Privacy Commissioner of Canada, 2005. Online: http://www.privcom.gc.ca/incidents/2005/050418_01_e.asp.
-
(2005)
Office of the Privacy Commissioner of Canada
, pp. 2005
-
-
-
9
-
-
33847763406
-
-
DAML 2003, DAML-S: Semantic markup for Web services. The DAML Services Coalition, Version 0.9. Online
-
DAML (2003). DAML-S: Semantic markup for Web services. The DAML Services Coalition, Version 0.9. Online: http://www.daml.org/services/daml-s/0.9/daml-s. html.
-
-
-
-
10
-
-
0034206071
-
Protecting privacy in the cyber era
-
Summer
-
Davis, J. C. (2000). Protecting privacy in the cyber era. IEEE Technology and Society Magazine, 19(2), 10-22 (Summer).
-
(2000)
IEEE Technology and Society Magazine
, vol.19
, Issue.2
, pp. 10-22
-
-
Davis, J.C.1
-
12
-
-
0141911037
-
Role-based access control
-
Norwood, MA: Artech House
-
Ferraiolo, D. F., Kuhn, D. R., & Chandramouli, R. (2003). Role-based access control. In Computer Security Series. Norwood, MA: Artech House.
-
(2003)
Computer Security Series
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
Chandramouli, R.3
-
15
-
-
0036322098
-
-
IS Audit Editor. New York: Elsevier
-
Hinde, S. (2002). The perils of privacy (pp. 424-432). IS Audit Editor. New York: Elsevier.
-
(2002)
The perils of privacy
, pp. 424-432
-
-
Hinde, S.1
-
16
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
August
-
Hong, J. I., Ng, J. D., Lederer, S., & Landay, J. A. (2004). Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In Proceedings of the 2004 conference on Designing interactive systems: processes, practices, methods, and techniques (August).
-
(2004)
Proceedings of the 2004 conference on Designing interactive systems: Processes, practices, methods, and techniques
-
-
Hong, J.I.1
Ng, J.D.2
Lederer, S.3
Landay, J.A.4
-
17
-
-
4544228476
-
-
Hung, Patrick C. K., Ferrari, E., & Carminati, B. (2004). Towards standardized Web services privacy technologies. In Proceedings of the 2004 IEEE International Conference on Web Services (ICWS), 6-9 July, pp. 174-181.
-
Hung, Patrick C. K., Ferrari, E., & Carminati, B. (2004). Towards standardized Web services privacy technologies. In Proceedings of the 2004 IEEE International Conference on Web Services (ICWS), 6-9 July, pp. 174-181.
-
-
-
-
20
-
-
33847723163
-
-
IBM, & Microsoft 2002, Security in a web services world: A proposed architecture and roadmap. White Paper, Version 1.0
-
IBM, & Microsoft (2002). Security in a web services world: A proposed architecture and roadmap. White Paper, Version 1.0.
-
-
-
-
21
-
-
0036389538
-
-
Lategan, F. A, & Olivier, M. S, 2002, A Chinese wall approach to privacy policies for the Web. In Proceedings of the 26th Annual International Computer Software and Applications Conference COMPSAC'02
-
Lategan, F. A., & Olivier, M. S. (2002). A Chinese wall approach to privacy policies for the Web. In Proceedings of the 26th Annual International Computer Software and Applications Conference (COMPSAC'02).
-
-
-
-
22
-
-
0035653389
-
Privacy: A review of the literature
-
Leino-Kilpi, H., Valimaki, M., Dassen, T., Gasull, M., Lemonidou, C., Scott, A., & Arndt, M. (2001). Privacy: A review of the literature. International Journal of Nursing Studies, 38, 663-671.
-
(2001)
International Journal of Nursing Studies
, vol.38
, pp. 663-671
-
-
Leino-Kilpi, H.1
Valimaki, M.2
Dassen, T.3
Gasull, M.4
Lemonidou, C.5
Scott, A.6
Arndt, M.7
-
23
-
-
0033333334
-
Conflicts in policy-based distributed systems management
-
Lupu, E. C., & Sloman, M. (1999). Conflicts in policy-based distributed systems management. IEEE Transactions on Software Engineering, 25(6), 852-869.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.C.1
Sloman, M.2
-
24
-
-
33847722781
-
-
National Institute of Standard and Technology NIST, 12 May, Online
-
National Institute of Standard and Technology (NIST) (2005). Role based access control standards roadmap. 12 May 2005. Online: http://www.csrc.nist.gov/rbac/rbac-stds-roadmap.html.
-
(2005)
Role based access control standards roadmap
-
-
-
26
-
-
2442512413
-
-
OASIS , Online: ,php? wg_abbrev=xacml
-
OASIS (2003). extensible Access Control Markup Language (XACML). Online: http://www.oasis-open.org/cornrnittees/tc_home,php? wg_abbrev=xacml.
-
(2003)
extensible Access Control Markup Language (XACML)
-
-
-
27
-
-
17444417128
-
Averting security missteps in outsourcing
-
March-April
-
Power, E. M., & Trope, R. L. (2005). Averting security missteps in outsourcing, IEEE Security & Privacy Magazine, 5(2), 70-73 (March-April).
-
(2005)
IEEE Security & Privacy Magazine
, vol.5
, Issue.2
, pp. 70-73
-
-
Power, E.M.1
Trope, R.L.2
-
28
-
-
0036432811
-
The importance of technology trust in web services security
-
Ratnasingam, P. (2002). The importance of technology trust in web services security. Information Management & Computer Security, 10(5), 255-260.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.5
, pp. 255-260
-
-
Ratnasingam, P.1
-
31
-
-
0037402796
-
Privacyenhancing technologies-Approaches and development
-
Senicar, V., Jerman-Blazic, B., & Klobucar, T. (2003), Privacyenhancing technologies-Approaches and development. Computer Standards & Interfaces, 25, 147-158.
-
(2003)
Computer Standards & Interfaces
, vol.25
, pp. 147-158
-
-
Senicar, V.1
Jerman-Blazic, B.2
Klobucar, T.3
-
32
-
-
18744386990
-
Ontology guided Security Engine
-
Stoica, A., & Farkas, C. (2004), Ontology guided Security Engine. Journal of Intelligent Information Systems, 23(2), 209-223 (Special issue).
-
(2004)
Journal of Intelligent Information Systems
, vol.23
, Issue.2 SPECIAL ISSUE
, pp. 209-223
-
-
Stoica, A.1
Farkas, C.2
-
33
-
-
33847694079
-
-
W3C (2002). Web services architecture requirements. World Wide Web Consortium (W3C) Working Draft, 14 November 2002. Online: http://www.w3.org/TR/2002/WD-wsa-reqs-20021114.
-
W3C (2002). Web services architecture requirements. World Wide Web Consortium (W3C) Working Draft, 14 November 2002. Online: http://www.w3.org/TR/2002/WD-wsa-reqs-20021114.
-
-
-
-
34
-
-
33847749124
-
-
W3C (2003). OWL Web Ontology Language. Web-Ontology (WebOnt) Working Group, World Wide Web Consortium (W3C), 2003. Online: http://www.w3.org/2001/sw/WebOnt.
-
W3C (2003). OWL Web Ontology Language. Web-Ontology (WebOnt) Working Group, World Wide Web Consortium (W3C), 2003. Online: http://www.w3.org/2001/sw/WebOnt.
-
-
-
-
35
-
-
33847700268
-
-
W3C (2005). The platform for privacy preferences 1.1 (P3P1.1) specification. In World Wide Web Consortium (W3C) Recommendation, 1 July.
-
W3C (2005). The platform for privacy preferences 1.1 (P3P1.1) specification. In World Wide Web Consortium (W3C) Recommendation, 1 July.
-
-
-
-
37
-
-
4544296759
-
Services computing: Grid applications for today
-
July-Aug
-
Zhang, L.-J., Li, H., & Lam, H. (2004). Services computing: Grid applications for today. IT Professional, 6(4), 5-7 (July-Aug).
-
(2004)
IT Professional
, vol.6
, Issue.4
, pp. 5-7
-
-
Zhang, L.-J.1
Li, H.2
Lam, H.3
|