메뉴 건너뛰기




Volumn , Issue , 2007, Pages 966-973

A proxy for privacy: The discreet box

Author keywords

Ontologies; Privacy; Privacy legislation; Privacy middleware

Indexed keywords

COMPUTER SOFTWARE; DATA PRIVACY; INTERNET; LAWS AND LEGISLATION; MIDDLEWARE;

EID: 46149085886     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EURCON.2007.4400521     Document Type: Conference Paper
Times cited : (16)

References (29)
  • 1
    • 0000320829 scopus 로고
    • The Right to Privacy
    • Dec
    • S. D. Warren and L. D. Brandeis, "The Right to Privacy", Harvard Law Review, Vol. IV, No. 5, pp. 193-220, Dec. 1890.
    • (1890) Harvard Law Review , vol.4 , Issue.5 , pp. 193-220
    • Warren, S.D.1    Brandeis, L.D.2
  • 2
    • 46149090382 scopus 로고    scopus 로고
    • European Union citizens' views about privacy
    • The European Opinion Research Group, Dec
    • The European Opinion Research Group, "European Union citizens' views about privacy", Special Eurobarometer 196, Dec. 2003.
    • (2003) Special Eurobarometer , vol.196
  • 6
    • 46149118968 scopus 로고    scopus 로고
    • U.S.A. Federal Trade Commission, Eli Lilly Settles FTC Charges Concerning Security Breach, File No. 012 3214 In the Matter of Eli Lilly and Company, Jan. 2002.
    • U.S.A. Federal Trade Commission, "Eli Lilly Settles FTC Charges Concerning Security Breach", File No. 012 3214 In the Matter of Eli Lilly and Company, Jan. 2002.
  • 7
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • European Parliament and Council, Nov
    • European Parliament and Council, "Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data", Official Journal of the European Communities, No. L 281, pp. 31-50, Nov. 1995.
    • (1995) Official Journal of the European Communities , vol.L 281 , pp. 31-50
  • 8
    • 0034300797 scopus 로고    scopus 로고
    • Anomaly-based Intrusion Detection: Privacy Concerns and other Problems
    • Oct
    • E. Lundin and E. Jonsson, "Anomaly-based Intrusion Detection: Privacy Concerns and other Problems", Elsevier Computer Networks, Vol. 34, Issue 4, pp. 623-640, Oct. 2000.
    • (2000) Elsevier Computer Networks , vol.34 , Issue.4 , pp. 623-640
    • Lundin, E.1    Jonsson, E.2
  • 9
    • 46149118237 scopus 로고    scopus 로고
    • IST project PRIME Privacy and Identity Management for Europe, home page
    • IST project PRIME (Privacy and Identity Management for Europe), home page: https://www.prime-project.eu/.
  • 11
    • 23244445557 scopus 로고    scopus 로고
    • X-GTRBAC: An XMLBased Policy Specification Framework and Architecture for Enterprise-Wide Access Control
    • May
    • R. Bhatti, A. Ghafoor, and E. Bertino, "X-GTRBAC: An XMLBased Policy Specification Framework and Architecture for Enterprise-Wide Access Control", ACM Trans. Information and System Security, vol. 8, no. 2, pp. 187-227, May 2005.
    • (2005) ACM Trans. Information and System Security , vol.8 , Issue.2 , pp. 187-227
    • Bhatti, R.1    Ghafoor, A.2    Bertino, E.3
  • 14
    • 33748527035 scopus 로고    scopus 로고
    • Personal Privacy in Ubiquitous Computing Tools and System Support
    • Ph.D. dissertation, University of Bielefeld, Bielefeld, Germany
    • M. Langheinrich, "Personal Privacy in Ubiquitous Computing Tools and System Support", Ph.D. dissertation, University of Bielefeld, Bielefeld, Germany, 2005.
    • (2005)
    • Langheinrich, M.1
  • 15
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • Jan.-Mar
    • G. Myles, A. Friday, and N. Davies, "Preserving privacy in environments with location-based applications", in IEEE Pervasive Computing, vol. 2, no. 1, pp. 56-64, Jan.-Mar. 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 56-64
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 16
    • 4544259863 scopus 로고    scopus 로고
    • J.I Hong and J.A. Landay, An Architecture for Privacy-Sensitive Ubiquitous Computing, in 2004 Proc. ACM Int. Conf. Mobile Systems, Applications, and Services, pp. 177-189.
    • J.I Hong and J.A. Landay, "An Architecture for Privacy-Sensitive Ubiquitous Computing", in 2004 Proc. ACM Int. Conf. Mobile Systems, Applications, and Services, pp. 177-189.
  • 18
    • 46149100997 scopus 로고    scopus 로고
    • U.S. Public Law No. 93-579, Dec. 31,1974,5 U.S.C. 552a.
    • U.S. Public Law No. 93-579, Dec. 31,1974,5 U.S.C. 552a.
  • 20
    • 24944574585 scopus 로고    scopus 로고
    • Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)
    • European Parliament and Council, Jul
    • European Parliament and Council, "Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)", Official Journal of the European Communities, No. L 201, pp. 37-47, Jul. 2002.
    • (2002) Official Journal of the European Communities , vol.L 201 , pp. 37-47
  • 21
    • 44349151297 scopus 로고    scopus 로고
    • Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC
    • European Parliament and Council, Apr
    • European Parliament and Council, "Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC", Official Journal of the European Communities, No. L 105, pp. 54-63, Apr. 2006.
    • (2006) Official Journal of the European Communities , vol.L 105 , pp. 54-63
  • 22
    • 46149083508 scopus 로고    scopus 로고
    • U.S. Public Law No. 100-503, Oct. 18, 1988, 5 U.S.C. 552a
    • U.S. Public Law No. 100-503, Oct. 18, 1988, 5 U.S.C. 552a.
  • 25
    • 46149107330 scopus 로고    scopus 로고
    • Regulation 2195/2002/EC of the European Parliament and of the Council on the Common Procurement Vocabulary (CPV)
    • European Parliament and Council, Dec
    • European Parliament and Council, "Regulation 2195/2002/EC of the European Parliament and of the Council on the Common Procurement Vocabulary (CPV)", Official Journal of the European Communities, No. L 340, pp. 1-562, Dec. 2002.
    • (2002) Official Journal of the European Communities , vol.L 340 , pp. 1-562
  • 28
    • 1142282727 scopus 로고    scopus 로고
    • (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions
    • Feb
    • J. Claessens, B. Preneel, J. Vandewalle, "(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions", ACM Transactions on Internet Technology (TOIT), Vol. 3 No. 1, p.28-48, Feb. 2003.
    • (2003) ACM Transactions on Internet Technology (TOIT) , vol.3 , Issue.1 , pp. 28-48
    • Claessens, J.1    Preneel, B.2    Vandewalle, J.3
  • 29
    • 46149089685 scopus 로고    scopus 로고
    • IST Project DISCREET Discreet Service Provision in Smart Environments, home page
    • IST Project DISCREET (Discreet Service Provision in Smart Environments), home page: http://www.ist-discreet.org.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.