-
1
-
-
18744366643
-
Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs
-
Washington, DC, USA, October 27-31
-
th ACMConference on Computer and Communication Security, Washington, DC, USA, October 27-31, 2003, pp93-102.
-
(2003)
th ACMConference on Computer and Communication Security
, pp. 93-102
-
-
Damiani, E.1
De Apitani di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
4
-
-
33646378260
-
Customer Relationship Report: Privacy, CRM and ROI
-
February
-
M. Nykamp and C. McEachern, "Customer Relationship Report: Privacy, CRM and ROI", DM Review, February 2001.
-
(2001)
DM Review
-
-
Nykamp, M.1
McEachern, C.2
-
6
-
-
33646339244
-
Companies and Consumers Clash on Privacy Issues
-
January 29, Available at
-
E. Favilla. "Companies and Consumers Clash on Privacy Issues", DestinationCRM, January 29, 2004. Available at http://www. destinationcrm.com/articles/default.asp?articlei d=3825.
-
(2004)
DestinationCRM
-
-
Favilla, E.1
-
7
-
-
33947100879
-
-
Republic of Argentine, Personal Data Protection Act. Act 25, 326. Chapter 1, October 4, 2000.
-
Republic of Argentine, "Personal Data Protection Act. Act 25, 326. Chapter 1", October 4, 2000.
-
-
-
-
9
-
-
33947130639
-
-
Republic of South Africa, Electronic Communications and Transactions Act. 2002. Act 25 of 2002. Chapter VIII -Protection of Personal Information, Scope of Protection of Personal Information.
-
Republic of South Africa, "Electronic Communications and Transactions Act. 2002. Act 25 of 2002. Chapter VIII -Protection of Personal Information, Scope of Protection of Personal Information".
-
-
-
-
10
-
-
38048999899
-
Design Considerations For Privacy-Preserving Database Access
-
IBM Corporation
-
A. Buecker and Y. Watanabe, "Design Considerations For Privacy-Preserving Database Access", Software Books Paper, IBM Corporation, 2003.
-
(2003)
Software Books Paper
-
-
Buecker, A.1
Watanabe, Y.2
-
11
-
-
84858877704
-
Database Security - Protecting Sensitive and Critical Information
-
January
-
S.C. Nevins, "Database Security - Protecting Sensitive and Critical Information", DM Direct, January 2003.
-
(2003)
DM Direct
-
-
Nevins, S.C.1
-
12
-
-
84858867594
-
Dept Admits Privacy Breach
-
June 06, Available at
-
F. Bowers, "Dept Admits Privacy Breach", IrishHealth. com, June 06, 2004. Available at http://www.irishhealth.com/?level= 4&id=5992.
-
(2004)
IrishHealth. com
-
-
Bowers, F.1
-
13
-
-
84858881471
-
Three Things You Don't Want to Know About Your Personal Information
-
July 9, Available at
-
A. Jahnke, "Three Things You Don't Want to Know About Your Personal Information", Darwin Magazine. July 9, 2003. Available at http://www.darwinmag.com/connect/opinion/column.html? ArticleID-831.
-
(2003)
Darwin Magazine
-
-
Jahnke, A.1
-
14
-
-
33947181365
-
Stolen Data: Yet Another Financial Privacy Breach
-
Union-Tribune Editorial, April 17
-
Union-Tribune Editorial, "Stolen Data: Yet Another Financial Privacy Breach", The San Diego Union-Tribune, April 17, 2004.
-
(2004)
The San Diego Union-Tribune
-
-
-
15
-
-
33947187239
-
-
News Target Network. Senators Want to Investigate Privacy Breach by JetBlue Airlines, October 26, 2004. Available at http://www. NewsTarget.com/000251.html.
-
"News Target Network. Senators Want to Investigate Privacy Breach by JetBlue Airlines", October 26, 2004. Available at http://www. NewsTarget.com/000251.html.
-
-
-
-
16
-
-
33947138140
-
-
T. Claburn, Report: People Don't Trust Government to Protect Privacy, Information Week, February 13, 2004. Available at http://www.informationweek.com/story/ show Article.jhtml? articleID=17700220.
-
T. Claburn, "Report: People Don't Trust Government to Protect Privacy", Information Week, February 13, 2004. Available at http://www.informationweek.com/story/ show Article.jhtml? articleID=17700220.
-
-
-
-
17
-
-
33947114301
-
Patient Privacy: Practical Tips to Avoid Being Caught in a Legal Crossfire
-
Editor JD, MPH. Available at
-
D. Groszkruger, "Patient Privacy: Practical Tips to Avoid Being Caught in a Legal Crossfire", CAPsules, Editor JD, MPH. Available at http://www.cap-mpt.com/riskmanagement/patient-privacy.html.
-
CAPsules
-
-
Groszkruger, D.1
-
18
-
-
0037998946
-
-
J.A. Cazier, B.B.M, Shao and R.D.St. Louis, Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility, Proceedings of the 2003 ACM Symposium on Applied Accounting, Melbourne, Florida, USA, pp. 617-622.
-
J.A. Cazier, B.B.M, Shao and R.D.St. Louis, "Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility", Proceedings of the 2003 ACM Symposium on Applied Accounting, Melbourne, Florida, USA, pp. 617-622.
-
-
-
-
19
-
-
33947096870
-
Mixing Privacy and Business Intelligence
-
August, Available at
-
A.K., Sinha, "Mixing Privacy and Business Intelligence", BI Report, August 2003. Available at http://www.dmreview.com/editorial/ dmreview/print_action.cfm?articleId=7268.
-
(2003)
BI Report
-
-
Sinha, A.K.1
-
20
-
-
2342522578
-
Financial Privacy Policies and the Need for Standardization
-
March/April
-
"Financial Privacy Policies and the Need for Standardization", IEEE Security & Privacy, March/April 2004, pp. 36-44.
-
(2004)
IEEE Security & Privacy
, pp. 36-44
-
-
-
21
-
-
0242624597
-
From Privacy Promises to Privacy Management - A New Approach for Enforcing Privacy Throughout an Enterprise
-
Virginia Beach, Virginia, September 23-26
-
P. Ashley, C. Powers and M. Schunter, "From Privacy Promises to Privacy Management - A New Approach for Enforcing Privacy Throughout an Enterprise", Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, Virginia, September 23-26, 2002, pp. 43-50.
-
(2002)
Proceedings of the 2002 Workshop on New Security Paradigms
, pp. 43-50
-
-
Ashley, P.1
Powers, C.2
Schunter, M.3
-
22
-
-
0037703469
-
E-P3P Privacy Policies and Privacy Authorization
-
Washington, DC, USA, November 21
-
P. Ashley, S. Hada, G. Karjoth and M. Schunter, "E-P3P Privacy Policies and Privacy Authorization", Proceeding of the ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA, November 21, 2002, pp. 103-109.
-
(2002)
Proceeding of the ACM Workshop on Privacy in the Electronic Society
, pp. 103-109
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Schunter, M.4
-
23
-
-
33845931808
-
On Granting Limited Access to Private Information
-
Hong Kong, Hong Kong
-
F.A Lategan and M.S. Olivier, "On Granting Limited Access to Private Information", Proceedings of the tenth International Conference on the World Wide Web, Hong Kong, Hong Kong, 2001, pp. 21-25.
-
(2001)
Proceedings of the tenth International Conference on the World Wide Web
, pp. 21-25
-
-
Lategan, F.A.1
Olivier, M.S.2
-
25
-
-
33947189055
-
Mostly and Issue of Trust
-
May 17, Available at
-
D. Kearns, "Mostly and Issue of Trust", Network World Fusion, May 17, 2004, Available at http://www.nwfusion.com/columnists/ 2004/0517kearns.html.
-
(2004)
Network World Fusion
-
-
Kearns, D.1
-
26
-
-
0002654263
-
Privacy Interfaces for Information Management
-
October
-
T. Lau, O. Etzioni, and D.S. Weld, "Privacy Interfaces for Information Management", Communications of the ACM, Vol. 42, No.10, October 1999, pp. 89-94.
-
(1999)
Communications of the ACM
, vol.42
, Issue.10
, pp. 89-94
-
-
Lau, T.1
Etzioni, O.2
Weld, D.S.3
-
28
-
-
33646349845
-
Harris-Equifax Consumer Privacy Survey 1991
-
Atlanta
-
A.F. Westin, "Harris-Equifax Consumer Privacy Survey 1991", GA:Equifax Inc, Atlanta.
-
GA:Equifax Inc
-
-
Westin, A.F.1
-
29
-
-
33947160050
-
Privacy Policies and Trust
-
February 17, Available at
-
R. Sullivan, "Privacy Policies and Trust", PromotionData. com. February 17, 2004. Available at http://www.promotiondata.com/print. php?sid=627.
-
(2004)
PromotionData. com
-
-
Sullivan, R.1
|