메뉴 건너뛰기




Volumn , Issue , 2007, Pages 671-678

Visual analysis of privacy risks in web services

Author keywords

[No Author keywords available]

Indexed keywords

E HEALTH; E-COMMERCE; EXISTING METHOD; INTERNATIONAL CONFERENCES; PRIVACY RISKS; SERVICE LIFE CYCLE; SERVICE USERS; VISUAL ANALYSIS; VISUAL TECHNIQUES;

EID: 46849107129     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICWS.2007.189     Document Type: Conference Paper
Times cited : (6)

References (18)
  • 2
    • 0242625276 scopus 로고    scopus 로고
    • Transforming Data to Satisfy Privacy Constraints
    • Edmonton, Alberta
    • V.S. Iyengar, "Transforming Data to Satisfy Privacy Constraints", Proceedings, SIGKDD'02, Edmonton, Alberta, 2002.
    • (2002) Proceedings, SIGKDD'02
    • Iyengar, V.S.1
  • 3
    • 85016682337 scopus 로고    scopus 로고
    • Privacy through Pseudonymity in User-Adaptive Systems
    • May
    • A. Kobsa, J. Schreck, "Privacy through Pseudonymity in User-Adaptive Systems", ACM Transactions in Internet Technology, Vol. 3, No. 2, May 2003, pp. 149-183.
    • (2003) ACM Transactions in Internet Technology , vol.3 , Issue.2 , pp. 149-183
    • Kobsa, A.1    Schreck, J.2
  • 4
    • 51149108759 scopus 로고    scopus 로고
    • R. Song, L. Korba, and G. Yee, Pseudonym Technology for E-Services, chapter in Privacy Protection for E-Services, edited by G. Yee, Idea Group, Inc., 2006.
    • R. Song, L. Korba, and G. Yee, "Pseudonym Technology for E-Services", chapter in Privacy Protection for E-Services, edited by G. Yee, Idea Group, Inc., 2006.
  • 5
    • 77954006965 scopus 로고    scopus 로고
    • C. Adams and K. Barbieri, Privacy Enforcement in E-Services Environments, chapter in Privacy Protection for E-Services, edited by G. Yee, Idea Group, Inc., 2006.
    • C. Adams and K. Barbieri, "Privacy Enforcement in E-Services Environments", chapter in Privacy Protection for E-Services, edited by G. Yee, Idea Group, Inc., 2006.
  • 6
    • 0036431099 scopus 로고    scopus 로고
    • Adapting Digital Rights Management to Privacy Rights Management
    • November
    • S. Kenny and L. Korba, "Adapting Digital Rights Management to Privacy Rights Management", Computers & Security, Vol. 21, No. 7, November 2002, pp. 648-664.
    • (2002) Computers & Security , vol.21 , Issue.7 , pp. 648-664
    • Kenny, S.1    Korba, L.2
  • 9
    • 0030644696 scopus 로고    scopus 로고
    • Privacy-Enhancing Technologies for the Internet
    • I. Goldberg, D. Wagner, and E. Brewer, "Privacy-Enhancing Technologies for the Internet", IEEE COMPCON'97, 1997, pp. 103-109.
    • (1997) IEEE COMPCON'97 , pp. 103-109
    • Goldberg, I.1    Wagner, D.2    Brewer, E.3
  • 10
    • 85001837279 scopus 로고    scopus 로고
    • Semi-Automatic Derivation and Use of Personal Privacy Policies in E-Business
    • Idea Group Publishing
    • G. Yee, L. Korba, "Semi-Automatic Derivation and Use of Personal Privacy Policies in E-Business", International Journal of E-Business Research, Vol. 1, No. 1, Idea Group Publishing, 2005, pp. 54-69.
    • (2005) International Journal of E-Business Research , vol.1 , Issue.1 , pp. 54-69
    • Yee, G.1    Korba, L.2
  • 11
    • 56449101804 scopus 로고    scopus 로고
    • G. Yee, L. Korba, R. Song, L., Legislative Bases for Personal Privacy Policy Specification, chapter in Privacy Protection for E-Services, edited by G. Yee, Idea Group, Inc., 2006.
    • G. Yee, L. Korba, R. Song, L., "Legislative Bases for Personal Privacy Policy Specification", chapter in Privacy Protection for E-Services, edited by G. Yee, Idea Group, Inc., 2006.
  • 12
    • 46849102275 scopus 로고    scopus 로고
    • W3C; A P3P Preference Exchange Language 1.0 (APPEL 1.0); W3C Working Draft 15 April 2002, available as of February 28, 2007 at: http://www.w3.org/TR/P3P-preferences/
    • W3C; "A P3P Preference Exchange Language 1.0 (APPEL 1.0)"; W3C Working Draft 15 April 2002, available as of February 28, 2007 at: http://www.w3.org/TR/P3P-preferences/
  • 14
    • 3042575530 scopus 로고    scopus 로고
    • The Negotiation of Privacy Policies in Distance Education
    • Philadelphia, Pennsylvania, May 18-21
    • G. Yee, L. Korba, "The Negotiation of Privacy Policies in Distance Education", Proceedings, 14th IRMA International Conference, Philadelphia, Pennsylvania, May 18-21, 2003.
    • (2003) Proceedings, 14th IRMA International Conference
    • Yee, G.1    Korba, L.2
  • 16
    • 34250771078 scopus 로고    scopus 로고
    • Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program
    • Pittsburgh, Pennsylvania, USA
    • P.A. Karger, "Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program", Proceedings of the Second Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, USA, 2006, pp. 114-121.
    • (2006) Proceedings of the Second Symposium on Usable Privacy and Security , pp. 114-121
    • Karger, P.A.1
  • 18
    • 46849105594 scopus 로고    scopus 로고
    • Wikipedia, Data Flow Diagram, available at: http://en.wikipedia.org/wiki/Data_flow_diagram (visited July 1, 2006).
    • Wikipedia, "Data Flow Diagram", available at: http://en.wikipedia.org/wiki/Data_flow_diagram (visited July 1, 2006).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.