-
2
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam, N.R., & Worthmann, J.C. (1989). Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4), 515-556
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Worthmann, J.C.2
-
5
-
-
0004152399
-
-
Chicago: University of Chicago Press
-
Arendt, H. (1958). The Human Condition. Chicago: University of Chicago Press
-
(1958)
The Human Condition
-
-
Arendt, H.1
-
6
-
-
0037703469
-
E-p3p privacy policies and privacy authorization
-
In New York: ACM
-
Ashley, P., Hada, S., Karjoth, G., & Schunter, M. (2002). E-p3p privacy policies and privacy authorization. In Proceeding of the ACM workshop on privacy in the electronic society (pp. 103-109). New York: ACM
-
(2002)
Proceeding of the ACM Workshop on Privacy in the Electronic Society
, pp. 103-109
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Schunter, M.4
-
7
-
-
0242624597
-
From privacy promises to privacy management: A new approach for enforcing privacy throughout an enterprise
-
In New York: ACM
-
Ashley, P., Powers, C., & Schunter, M. (2002). From privacy promises to privacy management: A new approach for enforcing privacy throughout an enterprise. In Proceedings of the 2002 workshop on new security paradigms (pp. 43-50). New York: ACM
-
(2002)
Proceedings of the 2002 Workshop on New Security Paradigms
, pp. 43-50
-
-
Ashley, P.1
Powers, C.2
Schunter, M.3
-
8
-
-
0019056889
-
A security mechanism for statistical databases
-
Beck, L.L. (1980). A security mechanism for statistical databases. ACM Transactions on Database Systems, 5(3), 316-338
-
(1980)
ACM Transactions on Database Systems
, vol.5
, Issue.3
, pp. 316-338
-
-
Beck, L.L.1
-
10
-
-
0002964190
-
Privacy as an aspect of human dignity
-
Bloustein, E.J. (1964). Privacy as an aspect of human dignity. New York University Law Review, 39, 962-1007
-
(1964)
New York University Law Review
, vol.39
, pp. 962-1007
-
-
Bloustein, E.J.1
-
12
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
In B. Pfitzmann (Ed.) Heidelberg: Springer
-
Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In B. Pfitzmann (Ed.), Advances in cryptology - EUROCRYPT 2001. Lecture Notes in Computer Science, vol. 2045 (pp. 93-118). Heidelberg: Springer
-
(2001)
Advances in Cryptology - EUROCRYPT 2001. Lecture Notes in Computer Science
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D. (1985). Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10), 1030-1044
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
15
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
In Heidelberg: Springer
-
Chaum, D., & Evertse, J.-H. (1987). A secure and privacy-protecting protocol for transmitting personal information between organizations. In CRYPTO 86. Lecture Notes in Computer Science, vol. 263 (pp. 118-167). Heidelberg: Springer
-
(1987)
CRYPTO 86. Lecture Notes in Computer Science
, vol.263
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.-H.2
-
16
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.L. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84-90
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
18
-
-
0020205885
-
Auditing and inference control in statistical databases
-
Chin, F.Y., & Ozsoyoglu, G. (1982). Auditing and inference control in statistical databases. IEEE Transactions Software Engineering, 8(6), 113-139
-
(1982)
IEEE Transactions Software Engineering
, vol.8
, Issue.6
, pp. 113-139
-
-
Chin, F.Y.1
Ozsoyoglu, G.2
-
19
-
-
84947289387
-
Real world patterns of failure in anonymity systems
-
In Heidelberg: Springer
-
Clayton, R., Danezis, G., & Kuhn, M.G. (2001). Real world patterns of failure in anonymity systems. In Information hiding: 4th international workshop, IHW 2001. Lecture Notes in Computer Science, vol. 2137 (pp. 230-244). Heidelberg: Springer
-
(2001)
Information Hiding: 4th International Workshop, IHW 2001. Lecture Notes in Computer Science
, vol.2137
, pp. 230-244
-
-
Clayton, R.1
Danezis, G.2
Kuhn, M.G.3
-
20
-
-
84882756366
-
The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences
-
In New York: ACM
-
Cranor, L.F. (2002). The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences. In Proceedings of the 12th annual conference on computers, freedom and privacy, (pp. 1-8). New York: ACM
-
(2002)
Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy
, pp. 1-8
-
-
Cranor, L.F.1
-
22
-
-
85031802442
-
Payment systems and credential mechanism with provable security against abuse by individuals
-
In Heidelberg: Springer
-
Damguård, I. (1990). Payment systems and credential mechanism with provable security against abuse by individuals. In CRYPTO 88. Lecture Notes in Computer Science, vol. 403 (pp. 328-335). Heidelberg: Springer
-
(1990)
CRYPTO 88. Lecture Notes in Computer Science
, vol.403
, pp. 328-335
-
-
Damguård, I.1
-
23
-
-
0018519346
-
Data security
-
Denning, D.E., & Denning, P.J. (1979). Data security. ACM Computing Surveys, 11(3), 227-249
-
(1979)
ACM Computing Surveys
, vol.11
, Issue.3
, pp. 227-249
-
-
Denning, D.E.1
Denning, P.J.2
-
27
-
-
0038898605
-
-
Forrester Research (September)
-
Forrester Research (1999). Post-web retail (September). http://www.forrester.com/
-
(1999)
Post-web Retail
-
-
-
29
-
-
0035455653
-
The anatomy of the grid: Enabling scalable virtual organizations
-
Foster, I., Kesselman, C., & Tuecke, S. (2001). The anatomy of the grid: Enabling scalable virtual organizations. International Journal of High Performance Computing Applications, 15(3), 200-222
-
(2001)
International Journal of High Performance Computing Applications
, vol.15
, Issue.3
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
30
-
-
0001601662
-
Privacy
-
[a moral analysis]
-
Fried, C. (1968). Privacy [a moral analysis]. Yale Law Journal, 77, 475-493
-
(1968)
Yale Law Journal
, vol.77
, pp. 475-493
-
-
Fried, C.1
-
32
-
-
84925914934
-
Intimacy and privacy
-
Gerstein, R.S. (1978). Intimacy and privacy. Ethics, 89, 76-81
-
(1978)
Ethics
, vol.89
, pp. 76-81
-
-
Gerstein, R.S.1
-
33
-
-
0005063385
-
Onion routing
-
Goldschlag, D., Reed, M., & Syverson, P. (1999). Onion routing. Communications of the ACM, 42(2), 39-41
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
43
-
-
0038650644
-
Pseudonym systems
-
In Heidelberg: Springer
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., & Wolf, S. (1999). Pseudonym systems. In Proceedings of the sixth annual workshop on selected areas in cryptography (SAC'99). Lecture Notes in Computer Science, vol. 1758. Heidelberg: Springer
-
(1999)
Proceedings of the Sixth Annual Workshop on Selected Areas in Cryptography (SAC'99). Lecture Notes in Computer Science
, vol.1758
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
45
-
-
84976793562
-
Values, personal information privacy, and regulatory approaches
-
Milberg, S.J., Burke, S.J., Smith, H.J., & Kallman, E.A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38(12), 65-74
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 65-74
-
-
Milberg, S.J.1
Burke, S.J.2
Smith, H.J.3
Kallman, E.A.4
-
46
-
-
0042923706
-
Towards a theory of privacy in the information age
-
Moor, J.H. (1997). Towards a theory of privacy in the information age. ACM SIGCAS Computers and Society, 27(3), 27-32
-
(1997)
ACM SIGCAS Computers and Society
, vol.27
, Issue.3
, pp. 27-32
-
-
Moor, J.H.1
-
47
-
-
29844455709
-
Do privacy seals in e-commerce really work?
-
Moores, T.T., & Dhillon, G. (2003). Do privacy seals in e-commerce really work? Communications of the ACM, 46(12), 265-271
-
(2003)
Communications of the ACM
, vol.46
, Issue.12
, pp. 265-271
-
-
Moores, T.T.1
Dhillon, G.2
-
48
-
-
0345716708
-
Social distance and the veil
-
In Cambridge: Cambridge University Press (chapter 2)
-
Murphy, R.F. (1984). Social distance and the veil. In Philosophical dimensions of privacy: An anthology (pp. 34-54). Cambridge: Cambridge University Press (chapter f2)
-
(1984)
Philosophical Dimensions of Privacy: An Anthology
, pp. 34-54
-
-
Murphy, R.F.1
-
49
-
-
0009730706
-
-
Technical report, Nielson Norman Group
-
Nielsen, J., Molich, R., Snyder, C., & Farrell, S. (2000). E-commerce user experience. Technical report, Nielson Norman Group
-
(2000)
E-commerce User Experience
-
-
Nielsen, J.1
Molich, R.2
Snyder, C.3
Farrell, S.4
-
51
-
-
85131783489
-
Technologies for trust in electronic commerce
-
Patton, M.A., & Jøsang, A. (2004). Technologies for trust in electronic commerce. Electronic Commerce Research, 4(1-2), 9-21
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.1-2
, pp. 9-21
-
-
Patton, M.A.1
Jøsang, A.2
-
52
-
-
0039084976
-
An economic theory of privacy
-
In Cambridge: Cambridge University Press (chapter 15)
-
Posner, R.A. (1984). An economic theory of privacy. In Philosophical dimensions of privacy: An anthology (pp. 333-345). Cambridge: Cambridge University Press (chapter 15)
-
(1984)
Philosophical Dimensions of Privacy: An Anthology
, pp. 333-345
-
-
Posner, R.A.1
-
53
-
-
34247150045
-
-
Privacy International
-
Privacy International. National id cards. http://www.privacy.org/pi/ activities/idcard/
-
National Id Cards
-
-
-
54
-
-
0000839286
-
Privacy
-
[a legal analysis]
-
Prosser, W.L. (1960). Privacy [a legal analysis]. Harvard Law Review, 48, 338-423
-
(1960)
Harvard Law Review
, vol.48
, pp. 338-423
-
-
Prosser, W.L.1
-
55
-
-
84876010344
-
Why privacy is important
-
Rachels, J. (1975). Why privacy is important. Philosophy and Public Affairs, 4(4), 323-333
-
(1975)
Philosophy and Public Affairs
, vol.4
, Issue.4
, pp. 323-333
-
-
Rachels, J.1
-
56
-
-
0002265410
-
The platform for privacy preferences
-
Reagle, J., & Cranor, L.F. (1999). The platform for privacy preferences. Communications of the ACM, 42(2), 48-55
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 48-55
-
-
Reagle, J.1
Cranor, L.F.2
-
57
-
-
0021389555
-
Practical data-swapping: The first steps
-
Reiss, S.P. (1984). Practical data-swapping: The first steps. ACM Transactions on Database Systems, 9(1), 20-37
-
(1984)
ACM Transactions on Database Systems
, vol.9
, Issue.1
, pp. 20-37
-
-
Reiss, S.P.1
-
59
-
-
0001777423
-
Anonymous web transactions with crowds
-
Reiter, M.K., & Rubin, A.D. (1999). Anonymous web transactions with crowds. Communications of the ACM, 42(2), 32-48
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 32-48
-
-
Reiter, M.K.1
Rubin, A.D.2
-
60
-
-
1542300219
-
Preserving privacy in web services
-
In New York: ACM
-
Rezgui, A., Ouzzani, M., Bouguettaya, A., & Medjahed, B. (2002). Preserving privacy in web services. In Proceedings of the fourth international workshop on Web information and data management (pp. 56-62). New York: ACM
-
(2002)
Proceedings of the Fourth International Workshop on Web Information and Data Management
, pp. 56-62
-
-
Rezgui, A.1
Ouzzani, M.2
Bouguettaya, A.3
Medjahed, B.4
-
61
-
-
0010155502
-
Classical greek conceptions of public and private
-
In New York: St. Martins (chapter 15)
-
Saxonhouse, A.W. (1983). Classical greek conceptions of public and private. In Public and private in social life (pp. 363-384). New York: St. Martins (chapter 15)
-
(1983)
Public and Private in Social Life
, pp. 363-384
-
-
Saxonhouse, A.W.1
-
63
-
-
0016409563
-
Identification and retrieval of personal records from a statistical data bank
-
Schlörer, J. (1975). Identification and retrieval of personal records from a statistical data bank. Methods of Information in Medicine, 14(1), 7-13
-
(1975)
Methods of Information in Medicine
, vol.14
, Issue.1
, pp. 7-13
-
-
Schlörer, J.1
-
64
-
-
84976738484
-
Confidentiality and security in statistical data banks
-
In Munich: Verlag Dokumentation
-
Schlörer, J. (1977). Confidentiality and security in statistical data banks. In Proceedings of workshop on data documentation (pp. 101-123). Munich: Verlag Dokumentation
-
(1977)
Proceedings of Workshop on Data Documentation
, pp. 101-123
-
-
Schlörer, J.1
-
65
-
-
0019546487
-
Security of statistical databases: Multidimensional transformation
-
Schlörer, J. (1981). Security of statistical databases: multidimensional transformation. ACM Transactions on Database Systems, 6(1), 95-112
-
(1981)
ACM Transactions on Database Systems
, vol.6
, Issue.1
, pp. 95-112
-
-
Schlörer, J.1
-
66
-
-
0003297655
-
Privacy: Philosophical dimensions of the literature
-
In Cambridge: Cambridge University Press (chapter 1)
-
Schoeman, F. (1984). Privacy: Philosophical dimensions of the literature. In Philosophical dimensions of privacy: An anthology (pp. 1-33). Cambridge: Cambridge University Press (chapter 1)
-
(1984)
Philosophical Dimensions of Privacy: An Anthology
, pp. 1-33
-
-
Schoeman, F.1
-
68
-
-
0020313372
-
Statistical databases: Characteristics, problems, and some solutions
-
In September 8-10, Mexico city, Mexico San Francisco, CA: Morgan Kaufmann
-
Shoshani, A. (1982). Statistical databases: Characteristics, problems, and some solutions. In Proceedings of the eighth international conference on very large data bases. September 8-10, Mexico city, Mexico (pp. 208-222). San Francisco, CA: Morgan Kaufmann
-
(1982)
Proceedings of the Eighth International Conference on Very Large Data Bases
, pp. 208-222
-
-
Shoshani, A.1
-
72
-
-
0347978457
-
The underpinnings of privacy protection
-
Tuerkheimer, F.M. (1993). The underpinnings of privacy protection. Communications of the ACM, 36(8), 69-73
-
(1993)
Communications of the ACM
, vol.36
, Issue.8
, pp. 69-73
-
-
Tuerkheimer, F.M.1
-
74
-
-
0003034904
-
Personalization and privacy
-
Volokh, E. (2000). Personalization and privacy. Communications of the ACM, 43(8), 84-88
-
(2000)
Communications of the ACM
, vol.43
, Issue.8
, pp. 84-88
-
-
Volokh, E.1
-
75
-
-
0000320829
-
The right to privacy
-
[the implicit made explicit]
-
Warren, S.D., & Brandeis, L.D. (1890). The right to privacy [the implicit made explicit]. Harvard Law Review, 4(5), 193-220
-
(1890)
Harvard Law Review
, vol.4
, Issue.5
, pp. 193-220
-
-
Warren, S.D.1
Brandeis, L.D.2
-
76
-
-
5544232055
-
Privacy: Some arguments and assumptions
-
In Cambridge: Cambridge University Press (chapter 14)
-
Wasserstrom, R.A. (1984). Privacy: Some arguments and assumptions. In Philosophical dimensions of privacy: An anthology (pp. 317-332). Cambridge: Cambridge University Press (chapter 14)
-
(1984)
Philosophical Dimensions of Privacy: An Anthology
, pp. 317-332
-
-
Wasserstrom, R.A.1
-
77
-
-
0001775434
-
The theory and politics of the public/private distinction
-
In Chicago: University of Chicago Press (chapter 1)
-
Weintraub, J. (1997). The theory and politics of the public/private distinction. In Public and private in thouht and practise (pp. 1-42). Chicago: University of Chicago Press (chapter 1)
-
(1997)
Public and Private in Thought and Practise
, pp. 1-42
-
-
Weintraub, J.1
-
80
-
-
0037672590
-
The origins of modern claims to privacy
-
In Cambridge, UK: Cambridge University Press (chapter 3)
-
Westin, A.F. (1984). The origins of modern claims to privacy. In Philosophical dimensions of privacy: An anthology (pp. 56-74). Cambridge, UK: Cambridge University Press (chapter 3)
-
(1984)
Philosophical Dimensions of Privacy: An Anthology
, pp. 56-74
-
-
Westin, A.F.1
-
83
-
-
31144473961
-
Millar vs. Taylor
-
Yates, J. (1769). Millar vs. Taylor. In 4 Burr. (pp. 2303-2379)
-
(1769)
4 Burr
, pp. 2303-2379
-
-
Yates, J.1
|