-
1
-
-
0000320829
-
The Right to Privacy
-
Dec
-
S. D. Warren and L. D. Brandeis, "The Right to Privacy", Harvard Law Review, Vol. IV, No. 5, pp. 193-220, Dec. 1890.
-
(1890)
Harvard Law Review
, vol.4
, Issue.5
, pp. 193-220
-
-
Warren, S.D.1
Brandeis, L.D.2
-
2
-
-
46149090382
-
European Union citizens' views about privacy
-
The European Opinion Research Group, Dec
-
The European Opinion Research Group, "European Union citizens' views about privacy", Special Eurobarometer 196, Dec. 2003.
-
(2003)
Special Eurobarometer
, vol.196
-
-
-
3
-
-
0001903466
-
Context-Aware Computing Applications
-
Santa Cruz, CA, USA
-
B.N. Schilit, N.I. Adams, and R. Want, "Context-Aware Computing Applications", in Proc. of Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, USA, 1994.
-
(1994)
Proc. of Workshop on Mobile Computing Systems and Applications
-
-
Schilit, B.N.1
Adams, N.I.2
Want, R.3
-
6
-
-
46149118968
-
-
U.S.A. Federal Trade Commission, Eli Lilly Settles FTC Charges Concerning Security Breach, File No. 012 3214 In the Matter of Eli Lilly and Company, Jan. 2002.
-
U.S.A. Federal Trade Commission, "Eli Lilly Settles FTC Charges Concerning Security Breach", File No. 012 3214 In the Matter of Eli Lilly and Company, Jan. 2002.
-
-
-
-
7
-
-
0003187764
-
Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
European Parliament and Council, Nov
-
European Parliament and Council, "Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data", Official Journal of the European Communities, No. L 281, pp. 31-50, Nov. 1995.
-
(1995)
Official Journal of the European Communities
, vol.L 281
, pp. 31-50
-
-
-
8
-
-
0034300797
-
Anomaly-based Intrusion Detection: Privacy Concerns and other Problems
-
Oct
-
E. Lundin and E. Jonsson, "Anomaly-based Intrusion Detection: Privacy Concerns and other Problems", Elsevier Computer Networks, Vol. 34, Issue 4, pp. 623-640, Oct. 2000.
-
(2000)
Elsevier Computer Networks
, vol.34
, Issue.4
, pp. 623-640
-
-
Lundin, E.1
Jonsson, E.2
-
9
-
-
46149118237
-
-
IST project PRIME Privacy and Identity Management for Europe, home page
-
IST project PRIME (Privacy and Identity Management for Europe), home page: https://www.prime-project.eu/.
-
-
-
-
10
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Aug
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, R.D. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control", ACM Trans. Information and System Security, vol. 4, no. 3, Aug. 2001.
-
(2001)
ACM Trans. Information and System Security
, vol.4
, Issue.3
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, R.D.4
Chandramouli, R.5
-
11
-
-
23244445557
-
X-GTRBAC: An XMLBased Policy Specification Framework and Architecture for Enterprise-Wide Access Control
-
May
-
R. Bhatti, A. Ghafoor, and E. Bertino, "X-GTRBAC: An XMLBased Policy Specification Framework and Architecture for Enterprise-Wide Access Control", ACM Trans. Information and System Security, vol. 8, no. 2, pp. 187-227, May 2005.
-
(2005)
ACM Trans. Information and System Security
, vol.8
, Issue.2
, pp. 187-227
-
-
Bhatti, R.1
Ghafoor, A.2
Bertino, E.3
-
13
-
-
33845935560
-
Privacy Preserving Trust Authorization Framework Using XACML
-
U.M. Mbanaso, G.S. Cooper, D.W. Chadwick, and S. Proctor, "Privacy Preserving Trust Authorization Framework Using XACML", in 2006 Proc IEEE Int. World of Wireless, Mobile and Multimedia Networks Symp., pp. 673-678.
-
2006 Proc IEEE Int. World of Wireless, Mobile and Multimedia Networks Symp
, pp. 673-678
-
-
Mbanaso, U.M.1
Cooper, G.S.2
Chadwick, D.W.3
Proctor, S.4
-
14
-
-
33748527035
-
Personal Privacy in Ubiquitous Computing Tools and System Support
-
Ph.D. dissertation, University of Bielefeld, Bielefeld, Germany
-
M. Langheinrich, "Personal Privacy in Ubiquitous Computing Tools and System Support", Ph.D. dissertation, University of Bielefeld, Bielefeld, Germany, 2005.
-
(2005)
-
-
Langheinrich, M.1
-
15
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
Jan.-Mar
-
G. Myles, A. Friday, and N. Davies, "Preserving privacy in environments with location-based applications", in IEEE Pervasive Computing, vol. 2, no. 1, pp. 56-64, Jan.-Mar. 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
16
-
-
4544259863
-
-
J.I Hong and J.A. Landay, An Architecture for Privacy-Sensitive Ubiquitous Computing, in 2004 Proc. ACM Int. Conf. Mobile Systems, Applications, and Services, pp. 177-189.
-
J.I Hong and J.A. Landay, "An Architecture for Privacy-Sensitive Ubiquitous Computing", in 2004 Proc. ACM Int. Conf. Mobile Systems, Applications, and Services, pp. 177-189.
-
-
-
-
18
-
-
46149100997
-
-
U.S. Public Law No. 93-579, Dec. 31,1974,5 U.S.C. 552a.
-
U.S. Public Law No. 93-579, Dec. 31,1974,5 U.S.C. 552a.
-
-
-
-
20
-
-
24944574585
-
Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)
-
European Parliament and Council, Jul
-
European Parliament and Council, "Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)", Official Journal of the European Communities, No. L 201, pp. 37-47, Jul. 2002.
-
(2002)
Official Journal of the European Communities
, vol.L 201
, pp. 37-47
-
-
-
21
-
-
44349151297
-
Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC
-
European Parliament and Council, Apr
-
European Parliament and Council, "Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC", Official Journal of the European Communities, No. L 105, pp. 54-63, Apr. 2006.
-
(2006)
Official Journal of the European Communities
, vol.L 105
, pp. 54-63
-
-
-
22
-
-
46149083508
-
-
U.S. Public Law No. 100-503, Oct. 18, 1988, 5 U.S.C. 552a
-
U.S. Public Law No. 100-503, Oct. 18, 1988, 5 U.S.C. 552a.
-
-
-
-
25
-
-
46149107330
-
Regulation 2195/2002/EC of the European Parliament and of the Council on the Common Procurement Vocabulary (CPV)
-
European Parliament and Council, Dec
-
European Parliament and Council, "Regulation 2195/2002/EC of the European Parliament and of the Council on the Common Procurement Vocabulary (CPV)", Official Journal of the European Communities, No. L 340, pp. 1-562, Dec. 2002.
-
(2002)
Official Journal of the European Communities
, vol.L 340
, pp. 1-562
-
-
-
27
-
-
4544373958
-
Understanding Code Mobility
-
May
-
A. Fuggetta, G. P. Picco and G. Vigna, "Understanding Code Mobility," IEEE Transactions on Software Engineering, Vol. 24, No. 5, pp. 342-361, May 1998.
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.5
, pp. 342-361
-
-
Fuggetta, A.1
Picco, G.P.2
Vigna, G.3
-
28
-
-
1142282727
-
(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions
-
Feb
-
J. Claessens, B. Preneel, J. Vandewalle, "(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions", ACM Transactions on Internet Technology (TOIT), Vol. 3 No. 1, p.28-48, Feb. 2003.
-
(2003)
ACM Transactions on Internet Technology (TOIT)
, vol.3
, Issue.1
, pp. 28-48
-
-
Claessens, J.1
Preneel, B.2
Vandewalle, J.3
-
29
-
-
46149089685
-
-
IST Project DISCREET Discreet Service Provision in Smart Environments, home page
-
IST Project DISCREET (Discreet Service Provision in Smart Environments), home page: http://www.ist-discreet.org.
-
-
-
|