메뉴 건너뛰기




Volumn 4657 LNCS, Issue , 2007, Pages 65-74

Privacy assurance: Bridging the gap between preference and practice

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION RETRIEVAL; INTERNET SERVICE PROVIDERS; WEB SERVICES;

EID: 37349014592     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74409-2_9     Document Type: Conference Paper
Times cited : (12)

References (30)
  • 2
    • 0037077422 scopus 로고    scopus 로고
    • Standards for Privacy of Individually Identifiable Health Information
    • Office of the Secretary, August
    • Office of the Secretary, Standards for Privacy of Individually Identifiable Health Information, Federal Register, vol. 67-157 (August 2002), http://www.hhs.gov/ocr/hipaa/privrulepd.pdf
    • (2002) Federal Register , vol.67-157
  • 3
    • 0003692927 scopus 로고    scopus 로고
    • UK
    • Data Protection Act (1998) - UK, http://www.opsi.gov.uk/ACTS/acts1998/ 19980029.htm0
    • Data Protection Act
  • 4
    • 84943145987 scopus 로고    scopus 로고
    • Kobsa, A.: Tailoring Privacy to Users' Needs. In: Bauer, M., Gmytrasiewicz, P.J., Vassileva, J. (eds.) UM 2001. LNCS (LNAI), 2109, pp. 303-313. Springer, Heidelberg (2001)
    • Kobsa, A.: Tailoring Privacy to Users' Needs. In: Bauer, M., Gmytrasiewicz, P.J., Vassileva, J. (eds.) UM 2001. LNCS (LNAI), vol. 2109, pp. 303-313. Springer, Heidelberg (2001)
  • 6
    • 37349082735 scopus 로고    scopus 로고
    • BBBOnLine Privacy Seal Program, http://www.bbbonline.org/privacy/
    • BBBOnLine Privacy Seal Program, http://www.bbbonline.org/privacy/
  • 8
    • 84867973432 scopus 로고    scopus 로고
    • Trustworthiness in electronic commerce: The role of privacy, security, and site attributes
    • Berlanger, F., Hiller, J.S., Smith, W.J.: Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11, 245-270 (2002)
    • (2002) Journal of Strategic Information Systems , vol.11 , pp. 245-270
    • Berlanger, F.1    Hiller, J.S.2    Smith, W.J.3
  • 9
    • 0002809390 scopus 로고    scopus 로고
    • Designing Trust Into Online Experiences
    • Shneiderman, B.: Designing Trust Into Online Experiences. Communications of the ACM 43-12, 57-59 (2000)
    • (2000) Communications of the ACM , vol.43 -12 , pp. 57-59
    • Shneiderman, B.1
  • 10
    • 0002809390 scopus 로고    scopus 로고
    • Shneiderman, B.: Designing Trust Into Online Experiences. Communications of the ACM-43-12, 57-59 (2000)
    • Shneiderman, B.: Designing Trust Into Online Experiences. Communications of the ACM-43-12, 57-59 (2000)
  • 11
    • 37349130824 scopus 로고    scopus 로고
    • Leenes, R., Fischer-Hubner, S. (ed.): Prime Framework version 2, https://www.prime-project.eu/prime_products/reports/fmwk/pub_del_D14.1. b_ec_wp14.1_V1_final.pdf}
    • Leenes, R., Fischer-Hubner, S. (ed.): Prime Framework version 2, (https://www.prime-project.eu/prime_products/reports/fmwk/pub_del_D14.1. b_ec_wp14.1_V1_final.pdf}
  • 12
    • 37349120969 scopus 로고    scopus 로고
    • Cranor, L.F.: Web Privacy with P3P, O'Reilly and Associates (2002)
    • Cranor, L.F.: Web Privacy with P3P, O'Reilly and Associates (2002)
  • 14
    • 84900515472 scopus 로고    scopus 로고
    • Privacy in pervasive environments: Next generation labelling protocols
    • Springer, Heidelberg
    • Ackerman, M.S.: Privacy in pervasive environments: next generation labelling protocols. In: Personal Ubiquitous Computing 2004, pp. 430-439, Springer, Heidelberg (2004)
    • (2004) Personal Ubiquitous Computing , pp. 430-439
    • Ackerman, M.S.1
  • 15
    • 33745897920 scopus 로고    scopus 로고
    • Pearson, S.: Towards Automated Evaluation of Trust Constraints. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, 3986, pp. 252-266. Springer, Heidelberg (2006)
    • Pearson, S.: Towards Automated Evaluation of Trust Constraints. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 252-266. Springer, Heidelberg (2006)
  • 16
    • 37349081168 scopus 로고    scopus 로고
    • PRIME principles, https://www.prime-project,eu/about/principles/
    • PRIME principles, https://www.prime-project,eu/about/principles/
  • 17
    • 37349013135 scopus 로고    scopus 로고
    • VeriSign Identity Protection, http://www.verisign.com/products-services/ security-services/identity-protection/index.html
    • VeriSign Identity Protection
  • 19
    • 37349024554 scopus 로고    scopus 로고
    • Sommer, D. (ed.): PRIME Architecture version 2, (will appear mid to late 2007) https,.//www.primeproject.eu/prime_products/reports/arch/
    • Sommer, D. (ed.): PRIME Architecture version 2, (will appear mid to late 2007) https,.//www.primeproject.eu/prime_products/reports/arch/
  • 21
    • 33646680778 scopus 로고    scopus 로고
    • What Do They "Indicate?": Evaluating Security and Privacy Indicators
    • Cranor, L.F.: What Do They "Indicate?": Evaluating Security and Privacy Indicators. Interactions, 45-47 (2006)
    • (2006) Interactions , vol.45-47
    • Cranor, L.F.1
  • 22
    • 84957044012 scopus 로고    scopus 로고
    • A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations
    • GoIlmann, D, Karjoth, G, Waidner, M, eds, ESORICS 2002, Springer, Heidelberg
    • Hogben, G., Jackson, T., Wilikens, M.: A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations. In: GoIlmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, pp. 104-125. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2502 , pp. 104-125
    • Hogben, G.1    Jackson, T.2    Wilikens, M.3
  • 23
    • 84948670934 scopus 로고    scopus 로고
    • Privacy-enabled Services for Enterprise
    • IEEE, Los Alamitos
    • Karjoth, G., Schunter, M., Waidner, M.: Privacy-enabled Services for Enterprise. In: DEXA 2002, IEEE, Los Alamitos (2002)
    • (2002) DEXA
    • Karjoth, G.1    Schunter, M.2    Waidner, M.3
  • 24
    • 84957805078 scopus 로고    scopus 로고
    • Karjoth, G., Schunter, M., Waidner, M.: Platform for Enterprise Privacy Practices: Privacy-Enabled management of Customer Data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 69-84. Springer, Heidelberg (2003)
    • Karjoth, G., Schunter, M., Waidner, M.: Platform for Enterprise Privacy Practices: Privacy-Enabled management of Customer Data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 69-84. Springer, Heidelberg (2003)
  • 25
    • 0142157015 scopus 로고    scopus 로고
    • A Toolkit for Managing Enterprise Privacy Policies
    • Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
    • Backes, M., Pfitzmann, B., Schunter, M.: A Toolkit for Managing Enterprise Privacy Policies. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 162-180. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2808 , pp. 162-180
    • Backes, M.1    Pfitzmann, B.2    Schunter, M.3
  • 26
  • 30
    • 33745921913 scopus 로고    scopus 로고
    • Dealing with privacy obligations: Important aspects and technical approaches
    • Katsikas, S.K, Lopez, J, Pernul, G, eds, TrustBus 2004, Springer, Heidelberg
    • Casassa Mont, M.: Dealing with privacy obligations: Important aspects and technical approaches. In: Katsikas, S.K., Lopez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184,Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3184
    • Casassa Mont, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.