-
1
-
-
84858369581
-
-
http://www.epic.org/privacy/glba/.
-
-
-
-
2
-
-
0032027597
-
Modeling and analysis of workflows using petti nets
-
N. R. Adam, V. Atluri, and W.-K. Huang. Modeling and analysis of workflows using petti nets. J. Intell. Inf. Syst., 10(2):131-158, 1998.
-
(1998)
J. Intell. Inf. Syst
, vol.10
, Issue.2
, pp. 131-158
-
-
Adam, N.R.1
Atluri, V.2
Huang, W.-K.3
-
3
-
-
0042908709
-
Alternating-time temporal logic
-
R. Alur, T. A. Henzinger, and O. Kupferman. Alternating-time temporal logic. J. ACM, 49(5):672-713, 2002.
-
(2002)
J. ACM
, vol.49
, Issue.5
, pp. 672-713
-
-
Alur, R.1
Henzinger, T.A.2
Kupferman, O.3
-
5
-
-
35048836534
-
-
A. Anderson, A. Nadalin, B. Parducci, D. Engovatov, E. Coyne, F. Siebenlist, H. Lockhart, M. McIntosh, M. Kudo, P. Humenn, R. Jacobson, S. Proctor, S. Godik, S. Anderson, and T. Moses. Extensible access control markup language (XACML) version 2.0, 2004
-
A. Anderson, A. Nadalin, B. Parducci, D. Engovatov, E. Coyne, F. Siebenlist, H. Lockhart, M. McIntosh, M. Kudo, P. Humenn, R. Jacobson, S. Proctor, S. Godik, S. Anderson, and T. Moses. Extensible access control markup language (XACML) version 2.0, 2004.
-
-
-
-
6
-
-
35048861274
-
Analyzing website privacy requirements using a privacy goal taxonomy
-
A. I. Antón, J. B. Earp, and A. Reese. Analyzing website privacy requirements using a privacy goal taxonomy. In Requirements Engineering 2002, pages 23-31, 2002.
-
(2002)
Requirements Engineering 2002
, pp. 23-31
-
-
Antón, A.I.1
Earp, J.B.2
Reese, A.3
-
7
-
-
10944235396
-
Inside JetBlue's privacy policy violations
-
A. I. Antón, Q. He, and D. L. Baumer. Inside JetBlue's privacy policy violations. IEEE Security and Privacy, 2(6): 12-18, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.6
, pp. 12-18
-
-
Antón, A.I.1
He, Q.2
Baumer, D.L.3
-
8
-
-
84949747356
-
An authorization model for workflows
-
European Symposium on Research in Computer Security ESORICS, of, Springer-Verlag
-
V. Atluri and W.-K. Huang. An authorization model for workflows. In European Symposium on Research in Computer Security (ESORICS), volume 1146 of LNCS, pages 44-64. Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1146
, pp. 44-64
-
-
Atluri, V.1
Huang, W.-K.2
-
9
-
-
0142157015
-
A toolkit for managing enterprise privacy policies
-
European Symposium on Research in Computer Security ESORICS, of, Springer-Verlag
-
M. Backes, B. Pfitzmann, and M. Schunter. A toolkit for managing enterprise privacy policies. In European Symposium on Research in Computer Security (ESORICS), volume 2808 of LNCS, pages 101-119. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2808
, pp. 101-119
-
-
Backes, M.1
Pfitzmann, B.2
Schunter, M.3
-
10
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
IEEE Computer Society
-
A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum. Privacy and contextual integrity: Framework and applications. In IEEE Symposium on Security and Privacy, pages 184-198. IEEE Computer Society, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
13
-
-
33847742365
-
-
P. O'Reilly and Associates, Inc
-
L. F. Cranor. Web Privacy with P3P. O'Reilly and Associates, Inc., 2002.
-
(2002)
Web Privacy with
-
-
Cranor, L.F.1
-
14
-
-
35048850820
-
-
CSO Online. Safety in numbers. http://www.csoonline.com/metrics/ viewmetric.cfm?id=265.
-
CSO Online. Safety in numbers. http://www.csoonline.com/metrics/ viewmetric.cfm?id=265.
-
-
-
-
15
-
-
84948980573
-
UML activity diagrams as a workflow specification language
-
Springer-Verlag
-
M. Dumas and A. H. M. ter Hofstede. UML activity diagrams as a workflow specification language. In UML 2001, pages 76-90. Springer-Verlag, 2001.
-
(2001)
UML 2001
, pp. 76-90
-
-
Dumas, M.1
ter Hofstede, A.H.M.2
-
16
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
CRYPTO 2004: 24th Annual International Cryptology Conference, of, Springer-Verlag
-
C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO 2004: 24th Annual International Cryptology Conference, volume 3152 of LNCS, pages 528-544. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
17
-
-
35048852966
-
The logic of privacy
-
C. Evans-Pughe. The logic of privacy. The Economist, 382(8510):65-66, 2007.
-
(2007)
The Economist
, vol.382
, Issue.8510
, pp. 65-66
-
-
Evans-Pughe, C.1
-
18
-
-
35048843174
-
-
Federal Trade Commission. In brief: the financial privacy requirements of the Gramm-Leach-Bliley Act. http://www.ftc.gov/bcp/conline/pubs/buspubs/ glbshort.htm, 2002.
-
Federal Trade Commission. In brief: the financial privacy requirements of the Gramm-Leach-Bliley Act. http://www.ftc.gov/bcp/conline/pubs/buspubs/ glbshort.htm, 2002.
-
-
-
-
20
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
L. Lamport. Time, clocks, and the ordering of events in a distributed system. Commun. ACM, 21(7):558-565, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
21
-
-
85102591607
-
Limiting disclosure in hippocratic databases
-
Toronto, Canada
-
K. LeFevre, R. Agrawal, V Ercegovac, R. Ramakrishnan, Y Xu, and D. DeWitt. Limiting disclosure in hippocratic databases. In 30th Int'l Conf. on Very Large Data Bases, August 2004., Toronto, Canada, 2004.
-
(2004)
30th Int'l Conf. on Very Large Data Bases, August 2004
-
-
LeFevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.6
-
22
-
-
3843064285
-
Causation as influence
-
D. Lewis. Causation as influence. The Journal of Philosophy, 97(4): 181-197, 2000.
-
(2000)
The Journal of Philosophy
, vol.97
, Issue.4
, pp. 181-197
-
-
Lewis, D.1
-
25
-
-
33947620690
-
Privacy apis: Access control techniques to analyze and verify legal privacy policies
-
IEEE Computer Society
-
M. J. May, C. A. Gunter, and I. Lee. Privacy apis: Access control techniques to analyze and verify legal privacy policies. In IEEE Workshop on Computer Security Foundations, pages 85-97. IEEE Computer Society, 2006.
-
(2006)
IEEE Workshop on Computer Security Foundations
, pp. 85-97
-
-
May, M.J.1
Gunter, C.A.2
Lee, I.3
-
26
-
-
1842538795
-
Privacy as contextual integrity
-
H. Nissenbaum. Privacy as contextual integrity. Washington Law Review, 79(1):119-158, 2004.
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 119-158
-
-
Nissenbaum, H.1
-
28
-
-
0344328867
-
-
Office for Civil Rights, US Department of Health & Human Services
-
Office for Civil Rights. Summary of the HIPAA privacy rule. US Department of Health & Human Services, 2003.
-
(2003)
Summary of the HIPAA privacy rule
-
-
-
30
-
-
0002265410
-
The platform for privacy preferences
-
J. Reagle and L. F. Cranor. The platform for privacy preferences. Communications of the ACM, 42(2):48-55, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 48-55
-
-
Reagle, J.1
Cranor, L.F.2
-
32
-
-
24944578141
-
-
M. Schunter, P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter. Enterprise privacy authorization language (EPAL 1.1). http://www.zurich.ibm.com/ security/enterprise-privacy/epal/Specification/, 2003.
-
(2003)
Enterprise privacy authorization language (EPAL 1.1)
-
-
Schunter, M.1
Ashley, P.2
Hada, S.3
Karjoth, G.4
Powers, C.5
Schunter, M.6
-
34
-
-
84904261196
-
-
W. Teepe, R. P. van de Riet, and M. S. Olivier. Workflow analyzed for security and privacy in using databases. In Working Conference on Database Security, pages 271-282. Kluwer, B.V, 2001.
-
W. Teepe, R. P. van de Riet, and M. S. Olivier. Workflow analyzed for security and privacy in using databases. In Working Conference on Database Security, pages 271-282. Kluwer, B.V, 2001.
-
-
-
-
35
-
-
84858344674
-
-
University of Medicine & Dentistry of New Jersey, FAQ's
-
University of Medicine & Dentistry of New Jersey. HIPAA Security Standards FAQ's.http://www2.umdnj.edu/hipaaweb/security/security.emailFAQ02.htm.
-
HIPAA Security Standards
-
-
-
36
-
-
84858344673
-
-
Vanderbilt Medical Center
-
Vanderbilt Medical Center. MyHealthAtVanderbilt. https://www. myhealthatvanderbilt.com/.
-
MyHealthAtVanderbilt
-
-
|