메뉴 건너뛰기




Volumn , Issue , 2007, Pages 279-291

Privacy and utility in business processes

Author keywords

[No Author keywords available]

Indexed keywords

AUDIT LOGS; INEXACT INFORMATION; PRIVACY POLICY;

EID: 35048898814     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.26     Document Type: Conference Paper
Times cited : (84)

References (36)
  • 1
    • 84858369581 scopus 로고    scopus 로고
    • http://www.epic.org/privacy/glba/.
  • 2
    • 0032027597 scopus 로고    scopus 로고
    • Modeling and analysis of workflows using petti nets
    • N. R. Adam, V. Atluri, and W.-K. Huang. Modeling and analysis of workflows using petti nets. J. Intell. Inf. Syst., 10(2):131-158, 1998.
    • (1998) J. Intell. Inf. Syst , vol.10 , Issue.2 , pp. 131-158
    • Adam, N.R.1    Atluri, V.2    Huang, W.-K.3
  • 3
    • 0042908709 scopus 로고    scopus 로고
    • Alternating-time temporal logic
    • R. Alur, T. A. Henzinger, and O. Kupferman. Alternating-time temporal logic. J. ACM, 49(5):672-713, 2002.
    • (2002) J. ACM , vol.49 , Issue.5 , pp. 672-713
    • Alur, R.1    Henzinger, T.A.2    Kupferman, O.3
  • 5
    • 35048836534 scopus 로고    scopus 로고
    • A. Anderson, A. Nadalin, B. Parducci, D. Engovatov, E. Coyne, F. Siebenlist, H. Lockhart, M. McIntosh, M. Kudo, P. Humenn, R. Jacobson, S. Proctor, S. Godik, S. Anderson, and T. Moses. Extensible access control markup language (XACML) version 2.0, 2004
    • A. Anderson, A. Nadalin, B. Parducci, D. Engovatov, E. Coyne, F. Siebenlist, H. Lockhart, M. McIntosh, M. Kudo, P. Humenn, R. Jacobson, S. Proctor, S. Godik, S. Anderson, and T. Moses. Extensible access control markup language (XACML) version 2.0, 2004.
  • 6
    • 35048861274 scopus 로고    scopus 로고
    • Analyzing website privacy requirements using a privacy goal taxonomy
    • A. I. Antón, J. B. Earp, and A. Reese. Analyzing website privacy requirements using a privacy goal taxonomy. In Requirements Engineering 2002, pages 23-31, 2002.
    • (2002) Requirements Engineering 2002 , pp. 23-31
    • Antón, A.I.1    Earp, J.B.2    Reese, A.3
  • 7
    • 10944235396 scopus 로고    scopus 로고
    • Inside JetBlue's privacy policy violations
    • A. I. Antón, Q. He, and D. L. Baumer. Inside JetBlue's privacy policy violations. IEEE Security and Privacy, 2(6): 12-18, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.6 , pp. 12-18
    • Antón, A.I.1    He, Q.2    Baumer, D.L.3
  • 8
    • 84949747356 scopus 로고    scopus 로고
    • An authorization model for workflows
    • European Symposium on Research in Computer Security ESORICS, of, Springer-Verlag
    • V. Atluri and W.-K. Huang. An authorization model for workflows. In European Symposium on Research in Computer Security (ESORICS), volume 1146 of LNCS, pages 44-64. Springer-Verlag, 1996.
    • (1996) LNCS , vol.1146 , pp. 44-64
    • Atluri, V.1    Huang, W.-K.2
  • 9
    • 0142157015 scopus 로고    scopus 로고
    • A toolkit for managing enterprise privacy policies
    • European Symposium on Research in Computer Security ESORICS, of, Springer-Verlag
    • M. Backes, B. Pfitzmann, and M. Schunter. A toolkit for managing enterprise privacy policies. In European Symposium on Research in Computer Security (ESORICS), volume 2808 of LNCS, pages 101-119. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2808 , pp. 101-119
    • Backes, M.1    Pfitzmann, B.2    Schunter, M.3
  • 13
    • 33847742365 scopus 로고    scopus 로고
    • P. O'Reilly and Associates, Inc
    • L. F. Cranor. Web Privacy with P3P. O'Reilly and Associates, Inc., 2002.
    • (2002) Web Privacy with
    • Cranor, L.F.1
  • 14
    • 35048850820 scopus 로고    scopus 로고
    • CSO Online. Safety in numbers. http://www.csoonline.com/metrics/ viewmetric.cfm?id=265.
    • CSO Online. Safety in numbers. http://www.csoonline.com/metrics/ viewmetric.cfm?id=265.
  • 15
    • 84948980573 scopus 로고    scopus 로고
    • UML activity diagrams as a workflow specification language
    • Springer-Verlag
    • M. Dumas and A. H. M. ter Hofstede. UML activity diagrams as a workflow specification language. In UML 2001, pages 76-90. Springer-Verlag, 2001.
    • (2001) UML 2001 , pp. 76-90
    • Dumas, M.1    ter Hofstede, A.H.M.2
  • 16
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-preserving datamining on vertically partitioned databases
    • CRYPTO 2004: 24th Annual International Cryptology Conference, of, Springer-Verlag
    • C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO 2004: 24th Annual International Cryptology Conference, volume 3152 of LNCS, pages 528-544. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3152 , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 17
    • 35048852966 scopus 로고    scopus 로고
    • The logic of privacy
    • C. Evans-Pughe. The logic of privacy. The Economist, 382(8510):65-66, 2007.
    • (2007) The Economist , vol.382 , Issue.8510 , pp. 65-66
    • Evans-Pughe, C.1
  • 18
    • 35048843174 scopus 로고    scopus 로고
    • Federal Trade Commission. In brief: the financial privacy requirements of the Gramm-Leach-Bliley Act. http://www.ftc.gov/bcp/conline/pubs/buspubs/ glbshort.htm, 2002.
    • Federal Trade Commission. In brief: the financial privacy requirements of the Gramm-Leach-Bliley Act. http://www.ftc.gov/bcp/conline/pubs/buspubs/ glbshort.htm, 2002.
  • 20
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • L. Lamport. Time, clocks, and the ordering of events in a distributed system. Commun. ACM, 21(7):558-565, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 22
    • 3843064285 scopus 로고    scopus 로고
    • Causation as influence
    • D. Lewis. Causation as influence. The Journal of Philosophy, 97(4): 181-197, 2000.
    • (2000) The Journal of Philosophy , vol.97 , Issue.4 , pp. 181-197
    • Lewis, D.1
  • 25
    • 33947620690 scopus 로고    scopus 로고
    • Privacy apis: Access control techniques to analyze and verify legal privacy policies
    • IEEE Computer Society
    • M. J. May, C. A. Gunter, and I. Lee. Privacy apis: Access control techniques to analyze and verify legal privacy policies. In IEEE Workshop on Computer Security Foundations, pages 85-97. IEEE Computer Society, 2006.
    • (2006) IEEE Workshop on Computer Security Foundations , pp. 85-97
    • May, M.J.1    Gunter, C.A.2    Lee, I.3
  • 26
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • H. Nissenbaum. Privacy as contextual integrity. Washington Law Review, 79(1):119-158, 2004.
    • (2004) Washington Law Review , vol.79 , Issue.1 , pp. 119-158
    • Nissenbaum, H.1
  • 28
    • 0344328867 scopus 로고    scopus 로고
    • Office for Civil Rights, US Department of Health & Human Services
    • Office for Civil Rights. Summary of the HIPAA privacy rule. US Department of Health & Human Services, 2003.
    • (2003) Summary of the HIPAA privacy rule
  • 30
    • 0002265410 scopus 로고    scopus 로고
    • The platform for privacy preferences
    • J. Reagle and L. F. Cranor. The platform for privacy preferences. Communications of the ACM, 42(2):48-55, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 48-55
    • Reagle, J.1    Cranor, L.F.2
  • 34
    • 84904261196 scopus 로고    scopus 로고
    • W. Teepe, R. P. van de Riet, and M. S. Olivier. Workflow analyzed for security and privacy in using databases. In Working Conference on Database Security, pages 271-282. Kluwer, B.V, 2001.
    • W. Teepe, R. P. van de Riet, and M. S. Olivier. Workflow analyzed for security and privacy in using databases. In Working Conference on Database Security, pages 271-282. Kluwer, B.V, 2001.
  • 35
    • 84858344674 scopus 로고    scopus 로고
    • University of Medicine & Dentistry of New Jersey, FAQ's
    • University of Medicine & Dentistry of New Jersey. HIPAA Security Standards FAQ's.http://www2.umdnj.edu/hipaaweb/security/security.emailFAQ02.htm.
    • HIPAA Security Standards
  • 36
    • 84858344673 scopus 로고    scopus 로고
    • Vanderbilt Medical Center
    • Vanderbilt Medical Center. MyHealthAtVanderbilt. https://www. myhealthatvanderbilt.com/.
    • MyHealthAtVanderbilt


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.