-
2
-
-
0037077422
-
Standards for Privacy of Individually Identifiable Health Information
-
Office of the Secretary, August
-
Office of the Secretary, Standards for Privacy of Individually Identifiable Health Information, Federal Register, vol. 67-157 (August 2002), http://www.hhs.gov/ocr/hipaa/privrulepd.pdf
-
(2002)
Federal Register
, vol.67-157
-
-
-
3
-
-
0003692927
-
-
UK
-
Data Protection Act (1998) - UK, http://www.opsi.gov.uk/ACTS/acts1998/ 19980029.htm0
-
Data Protection Act
-
-
-
4
-
-
84943145987
-
-
Kobsa, A.: Tailoring Privacy to Users' Needs. In: Bauer, M., Gmytrasiewicz, P.J., Vassileva, J. (eds.) UM 2001. LNCS (LNAI), 2109, pp. 303-313. Springer, Heidelberg (2001)
-
Kobsa, A.: Tailoring Privacy to Users' Needs. In: Bauer, M., Gmytrasiewicz, P.J., Vassileva, J. (eds.) UM 2001. LNCS (LNAI), vol. 2109, pp. 303-313. Springer, Heidelberg (2001)
-
-
-
-
6
-
-
37349082735
-
-
BBBOnLine Privacy Seal Program, http://www.bbbonline.org/privacy/
-
BBBOnLine Privacy Seal Program, http://www.bbbonline.org/privacy/
-
-
-
-
7
-
-
33749074011
-
The Platform for Privacy Preferences 1.1 (P3P1.1) Specification
-
February
-
Cranor, L.F., Hogben, G., Langheinrich, M., Marchiori, M., Presler-Marshal, M., Reagle, J., Schunter, M.: The Platform for Privacy Preferences 1.1 (P3P1.1) Specification, W3C Working Draft 10 (February 2006)
-
(2006)
W3C Working Draft
, vol.10
-
-
Cranor, L.F.1
Hogben, G.2
Langheinrich, M.3
Marchiori, M.4
Presler-Marshal, M.5
Reagle, J.6
Schunter, M.7
-
8
-
-
84867973432
-
Trustworthiness in electronic commerce: The role of privacy, security, and site attributes
-
Berlanger, F., Hiller, J.S., Smith, W.J.: Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11, 245-270 (2002)
-
(2002)
Journal of Strategic Information Systems
, vol.11
, pp. 245-270
-
-
Berlanger, F.1
Hiller, J.S.2
Smith, W.J.3
-
9
-
-
0002809390
-
Designing Trust Into Online Experiences
-
Shneiderman, B.: Designing Trust Into Online Experiences. Communications of the ACM 43-12, 57-59 (2000)
-
(2000)
Communications of the ACM
, vol.43 -12
, pp. 57-59
-
-
Shneiderman, B.1
-
10
-
-
0002809390
-
-
Shneiderman, B.: Designing Trust Into Online Experiences. Communications of the ACM-43-12, 57-59 (2000)
-
Shneiderman, B.: Designing Trust Into Online Experiences. Communications of the ACM-43-12, 57-59 (2000)
-
-
-
-
11
-
-
37349130824
-
-
Leenes, R., Fischer-Hubner, S. (ed.): Prime Framework version 2, https://www.prime-project.eu/prime_products/reports/fmwk/pub_del_D14.1. b_ec_wp14.1_V1_final.pdf}
-
Leenes, R., Fischer-Hubner, S. (ed.): Prime Framework version 2, (https://www.prime-project.eu/prime_products/reports/fmwk/pub_del_D14.1. b_ec_wp14.1_V1_final.pdf}
-
-
-
-
12
-
-
37349120969
-
-
Cranor, L.F.: Web Privacy with P3P, O'Reilly and Associates (2002)
-
Cranor, L.F.: Web Privacy with P3P, O'Reilly and Associates (2002)
-
-
-
-
14
-
-
84900515472
-
Privacy in pervasive environments: Next generation labelling protocols
-
Springer, Heidelberg
-
Ackerman, M.S.: Privacy in pervasive environments: next generation labelling protocols. In: Personal Ubiquitous Computing 2004, pp. 430-439, Springer, Heidelberg (2004)
-
(2004)
Personal Ubiquitous Computing
, pp. 430-439
-
-
Ackerman, M.S.1
-
15
-
-
33745897920
-
-
Pearson, S.: Towards Automated Evaluation of Trust Constraints. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, 3986, pp. 252-266. Springer, Heidelberg (2006)
-
Pearson, S.: Towards Automated Evaluation of Trust Constraints. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 252-266. Springer, Heidelberg (2006)
-
-
-
-
16
-
-
37349081168
-
-
PRIME principles, https://www.prime-project,eu/about/principles/
-
PRIME principles, https://www.prime-project,eu/about/principles/
-
-
-
-
17
-
-
37349013135
-
-
VeriSign Identity Protection, http://www.verisign.com/products-services/ security-services/identity-protection/index.html
-
VeriSign Identity Protection
-
-
-
18
-
-
22244442738
-
Towards secure sealing of privacy policies
-
Moulinos, K., Iliadis, J., Tsoumas, V.: Towards secure sealing of privacy policies. Information Management & Computer Security 12-4, 350-361 (2004)
-
(2004)
Information Management & Computer Security
, vol.12 -4
, pp. 350-361
-
-
Moulinos, K.1
Iliadis, J.2
Tsoumas, V.3
-
19
-
-
37349024554
-
-
Sommer, D. (ed.): PRIME Architecture version 2, (will appear mid to late 2007) https,.//www.primeproject.eu/prime_products/reports/arch/
-
Sommer, D. (ed.): PRIME Architecture version 2, (will appear mid to late 2007) https,.//www.primeproject.eu/prime_products/reports/arch/
-
-
-
-
21
-
-
33646680778
-
What Do They "Indicate?": Evaluating Security and Privacy Indicators
-
Cranor, L.F.: What Do They "Indicate?": Evaluating Security and Privacy Indicators. Interactions, 45-47 (2006)
-
(2006)
Interactions
, vol.45-47
-
-
Cranor, L.F.1
-
22
-
-
84957044012
-
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations
-
GoIlmann, D, Karjoth, G, Waidner, M, eds, ESORICS 2002, Springer, Heidelberg
-
Hogben, G., Jackson, T., Wilikens, M.: A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations. In: GoIlmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, pp. 104-125. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2502
, pp. 104-125
-
-
Hogben, G.1
Jackson, T.2
Wilikens, M.3
-
23
-
-
84948670934
-
Privacy-enabled Services for Enterprise
-
IEEE, Los Alamitos
-
Karjoth, G., Schunter, M., Waidner, M.: Privacy-enabled Services for Enterprise. In: DEXA 2002, IEEE, Los Alamitos (2002)
-
(2002)
DEXA
-
-
Karjoth, G.1
Schunter, M.2
Waidner, M.3
-
24
-
-
84957805078
-
-
Karjoth, G., Schunter, M., Waidner, M.: Platform for Enterprise Privacy Practices: Privacy-Enabled management of Customer Data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 69-84. Springer, Heidelberg (2003)
-
Karjoth, G., Schunter, M., Waidner, M.: Platform for Enterprise Privacy Practices: Privacy-Enabled management of Customer Data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 69-84. Springer, Heidelberg (2003)
-
-
-
-
25
-
-
0142157015
-
A Toolkit for Managing Enterprise Privacy Policies
-
Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
-
Backes, M., Pfitzmann, B., Schunter, M.: A Toolkit for Managing Enterprise Privacy Policies. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 162-180. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2808
, pp. 162-180
-
-
Backes, M.1
Pfitzmann, B.2
Schunter, M.3
-
30
-
-
33745921913
-
Dealing with privacy obligations: Important aspects and technical approaches
-
Katsikas, S.K, Lopez, J, Pernul, G, eds, TrustBus 2004, Springer, Heidelberg
-
Casassa Mont, M.: Dealing with privacy obligations: Important aspects and technical approaches. In: Katsikas, S.K., Lopez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184,Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3184
-
-
Casassa Mont, M.1
|