-
2
-
-
28444446666
-
Extending relational database systems to automatically enforce privacy policy
-
IEEE Computer Society, Los Alamitos
-
Agrawal R., Bird P., Grandison T., Kiernan J., Logan S., and Rjaibt W. Extending relational database systems to automatically enforce privacy policy. Proc. ICDE'05, IEEE Proceedings Vol. (2005), IEEE Computer Society, Los Alamitos 1013-1022
-
(2005)
Proc. ICDE'05, IEEE Proceedings Vol.
, pp. 1013-1022
-
-
Agrawal, R.1
Bird, P.2
Grandison, T.3
Kiernan, J.4
Logan, S.5
Rjaibt, W.6
-
3
-
-
24944578141
-
Enterprise Privacy Authorization Language (EPAL 1.1)
-
(available at: http://www.zurich.ibm.com/security/enterprice-privacy/epal - last access on 19.02.07)
-
Ashley P., Hada S., Karjoth G., Powers C., and Schunter M. Enterprise Privacy Authorization Language (EPAL 1.1). IBM Research Report (2003). http://www.zurich.ibm.com/security/enterprice-privacy/epal (available at: http://www.zurich.ibm.com/security/enterprice-privacy/epal - last access on 19.02.07)
-
(2003)
IBM Research Report
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
4
-
-
0141717704
-
Technology solutions for protecting privacy
-
IEEE Computer Society
-
Bayardo R.J., and Srikant R. Technology solutions for protecting privacy. Computer vol. 36(9) (2003), IEEE Computer Society 115-118
-
(2003)
Computer
, vol.36 9
, pp. 115-118
-
-
Bayardo, R.J.1
Srikant, R.2
-
6
-
-
34547697571
-
A database encryption scheme for enhanced security and easy sharing
-
IEEE Computer Society, Los Alamitos
-
Chen G., Chen K., and Dong J. A database encryption scheme for enhanced security and easy sharing. Proc. CSCWD'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 1-6
-
(2006)
Proc. CSCWD'06, IEEE Proceedings
, pp. 1-6
-
-
Chen, G.1
Chen, K.2
Dong, J.3
-
7
-
-
34547532673
-
A novel method for protecting sensitive knowledge in association rules mining
-
IEEE Computer Society, Los Alamitos
-
Chen T. A novel method for protecting sensitive knowledge in association rules mining. Proc. ISDA'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 694-699
-
(2006)
Proc. ISDA'06, IEEE Proceedings
, pp. 694-699
-
-
Chen, T.1
-
8
-
-
34548190327
-
Security requirements for a semantic service-oriented architecture
-
IEEE Computer Society, Los Alamitos
-
Durbeck S., Schillinger R., and Kolter J. Security requirements for a semantic service-oriented architecture. Proc. ARES'07, IEEE Proceedings (2007), IEEE Computer Society, Los Alamitos 356-365
-
(2007)
Proc. ARES'07, IEEE Proceedings
, pp. 356-365
-
-
Durbeck, S.1
Schillinger, R.2
Kolter, J.3
-
9
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
IEEE Computer Society, Los Alamitos
-
Fung C.M., Wang K., and Yu S.P. Top-down specialization for information and privacy preservation. Proc. ICDE'05, IEEE Proceedings (2005), IEEE Computer Society, Los Alamitos 206-216
-
(2005)
Proc. ICDE'05, IEEE Proceedings
, pp. 206-216
-
-
Fung, C.M.1
Wang, K.2
Yu, S.P.3
-
10
-
-
34547395826
-
Secure groups: enhanced management of encrypted data in databases
-
IEEE Computer Society, Los Alamitos
-
Gonzalez-Campos J.S. Secure groups: enhanced management of encrypted data in databases. Proc. ENC'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 92-100
-
(2006)
Proc. ENC'06, IEEE Proceedings
, pp. 92-100
-
-
Gonzalez-Campos, J.S.1
-
11
-
-
34548145633
-
Using privacy process patterns for incorporating privacy requirements into the system design process
-
IEEE Computer Society, Los Alamitos
-
Kalloniatis C., Kavakli E., and Gritzalis S. Using privacy process patterns for incorporating privacy requirements into the system design process. Proc. ARES'07, IEEE Proceedings (2007), IEEE Computer Society, Los Alamitos 1009-1017
-
(2007)
Proc. ARES'07, IEEE Proceedings
, pp. 1009-1017
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
12
-
-
34250030055
-
Building privacy into software products and services
-
IEEE Computer Society (3)
-
Knutson T. Building privacy into software products and services. IEEE Security and Privacy vol. 5 (2007), IEEE Computer Society 72-74 (3)
-
(2007)
IEEE Security and Privacy
, vol.5
, pp. 72-74
-
-
Knutson, T.1
-
13
-
-
44949126838
-
-
M. Langheinrich, Personal privacy in ubiquitous computing - tools and system support, PhD. Dissertation, ETH Zurich, 2005.
-
M. Langheinrich, Personal privacy in ubiquitous computing - tools and system support, PhD. Dissertation, ETH Zurich, 2005.
-
-
-
-
14
-
-
34250015784
-
Embedding information security into the organization
-
IEEE Computer Society (3)
-
Johnson M.E., and Goetz E. Embedding information security into the organization. IEEE Security and Privacy vol. 5 (2007), IEEE Computer Society 16-24 (3)
-
(2007)
IEEE Security and Privacy
, vol.5
, pp. 16-24
-
-
Johnson, M.E.1
Goetz, E.2
-
15
-
-
33749607006
-
l-diversity: privacy beyond k-anonymity
-
IEEE Computer Society, Los Alamitos
-
Machanavajjhala A., Gehrke J., and Kifer D. l-diversity: privacy beyond k-anonymity. Proc. ICDE'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 24
-
(2006)
Proc. ICDE'06, IEEE Proceedings
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
-
16
-
-
3142752802
-
The role of cryptography in database security
-
ACM, New York
-
Maurer U. The role of cryptography in database security. Proc. SIGMOD'04, ACM Proceedings (2004), ACM, New York 5-10
-
(2004)
Proc. SIGMOD'04, ACM Proceedings
, pp. 5-10
-
-
Maurer, U.1
-
17
-
-
0033207750
-
A general additive data perturbation method for database security
-
INFORMS (10)
-
Muralidhar K., Parsa R., and Sarathy R. A general additive data perturbation method for database security. Management Science vol. 45 (1999), INFORMS 1399-1415 (10)
-
(1999)
Management Science
, vol.45
, pp. 1399-1415
-
-
Muralidhar, K.1
Parsa, R.2
Sarathy, R.3
-
18
-
-
34248326773
-
Ultra-large-scale system. The software challenge of the future
-
(available at http://www.sei.cmu.edu/uls/ - last access on 19.02.07)
-
Northrop L. Ultra-large-scale system. The software challenge of the future. SEI Carnegie Mellon University Report (2006). http://www.sei.cmu.edu/uls/ (available at http://www.sei.cmu.edu/uls/ - last access on 19.02.07)
-
(2006)
SEI Carnegie Mellon University Report
-
-
Northrop, L.1
-
19
-
-
33751100921
-
End-to-end trustworthy data access in data-oriented scientific computing
-
IEEE Computer Society, Los Alamitos
-
Pallickara S.L., Plale B., Fang L., and Gannon D. End-to-end trustworthy data access in data-oriented scientific computing. Proc. CCGRID'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 4
-
(2006)
Proc. CCGRID'06, IEEE Proceedings
, pp. 4
-
-
Pallickara, S.L.1
Plale, B.2
Fang, L.3
Gannon, D.4
-
21
-
-
34548159019
-
A secure architecture for the pseudonymization of medical data
-
IEEE Computer Society, Los Alamitos
-
Riedl B., Neubauer T., and Geluch G. A secure architecture for the pseudonymization of medical data. Proc ARES'07, IEEE Proceedings (2007), IEEE Computer Society, Los Alamitos 318-324
-
(2007)
Proc ARES'07, IEEE Proceedings
, pp. 318-324
-
-
Riedl, B.1
Neubauer, T.2
Geluch, G.3
-
22
-
-
33748532138
-
Personalization in privacy-aware highly dynamic systems
-
ACM (9)
-
Sackman S., Struker J., and Accorsi R. Personalization in privacy-aware highly dynamic systems. Communications of the ACM vol. 49 (2006), ACM 32-38 (9)
-
(2006)
Communications of the ACM
, vol.49
, pp. 32-38
-
-
Sackman, S.1
Struker, J.2
Accorsi, R.3
-
23
-
-
33750085639
-
A reference model for authentication and authorisation infrastructures respecting privacy and flexibility in b2c eCommerce
-
IEEE Computer Society, Los Alamitos
-
Schlager C., Nowey T., and Montenegro J.A. A reference model for authentication and authorisation infrastructures respecting privacy and flexibility in b2c eCommerce. Proc. ARES'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 709-716
-
(2006)
Proc. ARES'06, IEEE Proceedings
, pp. 709-716
-
-
Schlager, C.1
Nowey, T.2
Montenegro, J.A.3
-
24
-
-
33750931991
-
Provably secure anonymous access control for heterogeneous trusts
-
IEEE Computer Society, Los Alamitos
-
Shin K., and Yasuda H. Provably secure anonymous access control for heterogeneous trusts. Proc. ARES'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 24-33
-
(2006)
Proc. ARES'06, IEEE Proceedings
, pp. 24-33
-
-
Shin, K.1
Yasuda, H.2
-
25
-
-
34547505017
-
PP-trust-X: a system for privacy preserving trust negotiations
-
ACM Article No. 12
-
Squicciarini A., Bertino E., Ferrari E., Paci F., and Thuraisingham B. PP-trust-X: a system for privacy preserving trust negotiations. ACM Transactions on Information and System Security vol. 10 (3) (2007), ACM Article No. 12
-
(2007)
ACM Transactions on Information and System Security
, vol.10 3
-
-
Squicciarini, A.1
Bertino, E.2
Ferrari, E.3
Paci, F.4
Thuraisingham, B.5
-
26
-
-
34250782624
-
Trust negotiations with customizable anonymity
-
IEEE Computer Society, Los Alamitos
-
Squicciarini A.C., Barghav A., Bertino E., Ferrari E., and Ray I. Trust negotiations with customizable anonymity. Proc. WI-IAT 2006, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 69-72
-
(2006)
Proc. WI-IAT 2006, IEEE Proceedings
, pp. 69-72
-
-
Squicciarini, A.C.1
Barghav, A.2
Bertino, E.3
Ferrari, E.4
Ray, I.5
-
27
-
-
33748525490
-
Privacy and security in highly dynamic systems: legal programming
-
ACM (9)
-
Subirana B., and Bain M. Privacy and security in highly dynamic systems: legal programming. Communications of the ACM vol. 49 (2006), ACM 28-31 (9)
-
(2006)
Communications of the ACM
, vol.49
, pp. 28-31
-
-
Subirana, B.1
Bain, M.2
-
29
-
-
33845574135
-
Privacy-aware autonomous agents for pervasive healthcare
-
IEEE Computer Society
-
Tentori M., Favela J., and Rodriguez M.D. Privacy-aware autonomous agents for pervasive healthcare. IEEE Intelligent Systems vol. 21 (6) (2006), IEEE Computer Society 55-62
-
(2006)
IEEE Intelligent Systems
, vol.21 6
, pp. 55-62
-
-
Tentori, M.1
Favela, J.2
Rodriguez, M.D.3
-
30
-
-
34547652877
-
Securely sharing data in encrypted databases
-
IEEE Computer Society, Los Alamitos
-
Yu L., Chen G., Chen K., and Dong J. Securely sharing data in encrypted databases. Proc. CSCWD'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 1-6
-
(2006)
Proc. CSCWD'06, IEEE Proceedings
, pp. 1-6
-
-
Yu, L.1
Chen, G.2
Chen, K.3
Dong, J.4
-
31
-
-
34247555884
-
Privacy-preserving data mining systems
-
IEEE Computer Society
-
Zhang N., and Zhao W. Privacy-preserving data mining systems. Computer vol. 40 (4) (2007), IEEE Computer Society 52-57
-
(2007)
Computer
, vol.40 4
, pp. 52-57
-
-
Zhang, N.1
Zhao, W.2
-
32
-
-
33845883003
-
A privacy-aware service-oriented platform for distributed data mining
-
IEEE Computer Society, Los Alamitos
-
Zhang X., Wogn H., and Cheung W.K. A privacy-aware service-oriented platform for distributed data mining. Proc. CEC/EEE'06, IEEE Proceedings (2006), IEEE Computer Society, Los Alamitos 44-47
-
(2006)
Proc. CEC/EEE'06, IEEE Proceedings
, pp. 44-47
-
-
Zhang, X.1
Wogn, H.2
Cheung, W.K.3
-
33
-
-
44949192539
-
-
Platform for Privacy Preferences (P3P) Project, W3C, http://www.w3.org/P3P/ (last access on January 2007).
-
Platform for Privacy Preferences (P3P) Project, W3C, http://www.w3.org/P3P/ (last access on January 2007).
-
-
-
|