-
2
-
-
0242625276
-
Transforming Data to Satisfy Privacy Constraints
-
Edmonton, Alberta
-
V.S. Iyengar, "Transforming Data to Satisfy Privacy Constraints", Proceedings, SIGKDD'02, Edmonton, Alberta, 2002.
-
(2002)
Proceedings, SIGKDD'02
-
-
Iyengar, V.S.1
-
3
-
-
85016682337
-
Privacy through Pseudonymity in User-Adaptive Systems
-
May
-
A. Kobsa, J. Schreck, "Privacy through Pseudonymity in User-Adaptive Systems", ACM Transactions in Internet Technology, Vol. 3, No. 2, May 2003, pp. 149-183.
-
(2003)
ACM Transactions in Internet Technology
, vol.3
, Issue.2
, pp. 149-183
-
-
Kobsa, A.1
Schreck, J.2
-
4
-
-
51149108759
-
-
R. Song, L. Korba, and G. Yee, Pseudonym Technology for E-Services, chapter in Privacy Protection for E-Services, edited by G. Yee, Idea Group, Inc., 2006.
-
R. Song, L. Korba, and G. Yee, "Pseudonym Technology for E-Services", chapter in Privacy Protection for E-Services, edited by G. Yee, Idea Group, Inc., 2006.
-
-
-
-
5
-
-
77954006965
-
-
C. Adams and K. Barbieri, Privacy Enforcement in E-Services Environments, chapter in Privacy Protection for E-Services, edited by G. Yee, Idea Group, Inc., 2006.
-
C. Adams and K. Barbieri, "Privacy Enforcement in E-Services Environments", chapter in Privacy Protection for E-Services, edited by G. Yee, Idea Group, Inc., 2006.
-
-
-
-
6
-
-
0036431099
-
Adapting Digital Rights Management to Privacy Rights Management
-
November
-
S. Kenny and L. Korba, "Adapting Digital Rights Management to Privacy Rights Management", Computers & Security, Vol. 21, No. 7, November 2002, pp. 648-664.
-
(2002)
Computers & Security
, vol.21
, Issue.7
, pp. 648-664
-
-
Kenny, S.1
Korba, L.2
-
7
-
-
4544364777
-
Privacy Policy Compliance for Web Services
-
San Diego, California, July 6-9
-
G. Yee, L. Korba, "Privacy Policy Compliance for Web Services", Proceedings, 2004 IEEE International Conference on Web Services (ICWS 2004), San Diego, California, July 6-9, 2004.
-
(2004)
Proceedings, 2004 IEEE International Conference on Web Services (ICWS 2004)
-
-
Yee, G.1
Korba, L.2
-
9
-
-
0030644696
-
Privacy-Enhancing Technologies for the Internet
-
I. Goldberg, D. Wagner, and E. Brewer, "Privacy-Enhancing Technologies for the Internet", IEEE COMPCON'97, 1997, pp. 103-109.
-
(1997)
IEEE COMPCON'97
, pp. 103-109
-
-
Goldberg, I.1
Wagner, D.2
Brewer, E.3
-
10
-
-
85001837279
-
Semi-Automatic Derivation and Use of Personal Privacy Policies in E-Business
-
Idea Group Publishing
-
G. Yee, L. Korba, "Semi-Automatic Derivation and Use of Personal Privacy Policies in E-Business", International Journal of E-Business Research, Vol. 1, No. 1, Idea Group Publishing, 2005, pp. 54-69.
-
(2005)
International Journal of E-Business Research
, vol.1
, Issue.1
, pp. 54-69
-
-
Yee, G.1
Korba, L.2
-
11
-
-
56449101804
-
-
G. Yee, L. Korba, R. Song, L., Legislative Bases for Personal Privacy Policy Specification, chapter in Privacy Protection for E-Services, edited by G. Yee, Idea Group, Inc., 2006.
-
G. Yee, L. Korba, R. Song, L., "Legislative Bases for Personal Privacy Policy Specification", chapter in Privacy Protection for E-Services, edited by G. Yee, Idea Group, Inc., 2006.
-
-
-
-
12
-
-
46849102275
-
-
W3C; A P3P Preference Exchange Language 1.0 (APPEL 1.0); W3C Working Draft 15 April 2002, available as of February 28, 2007 at: http://www.w3.org/TR/P3P-preferences/
-
W3C; "A P3P Preference Exchange Language 1.0 (APPEL 1.0)"; W3C Working Draft 15 April 2002, available as of February 28, 2007 at: http://www.w3.org/TR/P3P-preferences/
-
-
-
-
13
-
-
78649832628
-
Bilateral E-services Negotiation Under Uncertainty
-
Orlando, Florida, Jan. 27-31
-
G. Yee, L. Korba, "Bilateral E-services Negotiation Under Uncertainty", Proceedings, The 2003 International Symposium on Applications and the Internet (SAINT2003), Orlando, Florida, Jan. 27-31, 2003.
-
(2003)
Proceedings, The 2003 International Symposium on Applications and the Internet (SAINT2003)
-
-
Yee, G.1
Korba, L.2
-
14
-
-
3042575530
-
The Negotiation of Privacy Policies in Distance Education
-
Philadelphia, Pennsylvania, May 18-21
-
G. Yee, L. Korba, "The Negotiation of Privacy Policies in Distance Education", Proceedings, 14th IRMA International Conference, Philadelphia, Pennsylvania, May 18-21, 2003.
-
(2003)
Proceedings, 14th IRMA International Conference
-
-
Yee, G.1
Korba, L.2
-
15
-
-
10044248787
-
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems
-
Cambridge, MA, USA
-
J.I. Hong, J.D. Ng, S. Lederer, J.A. Landay, "Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems", Proceedings, 2004 Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, Cambridge, MA, USA, 2004, pp. 91-100.
-
(2004)
Proceedings, 2004 Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques
, pp. 91-100
-
-
Hong, J.I.1
Ng, J.D.2
Lederer, S.3
Landay, J.A.4
-
16
-
-
34250771078
-
Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program
-
Pittsburgh, Pennsylvania, USA
-
P.A. Karger, "Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program", Proceedings of the Second Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, USA, 2006, pp. 114-121.
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 114-121
-
-
Karger, P.A.1
-
17
-
-
0013191067
-
Towards a Secure System Engineering Methodology
-
Sept
-
C. Salter, O. Sami Saydjari, B. Schneier, J. Wallner, "Towards a Secure System Engineering Methodology", Proceedings of New Security Paradigms Workshop, Sept. 1998.
-
(1998)
Proceedings of New Security Paradigms Workshop
-
-
Salter, C.1
Sami Saydjari, O.2
Schneier, B.3
Wallner, J.4
-
18
-
-
46849105594
-
-
Wikipedia, Data Flow Diagram, available at: http://en.wikipedia.org/wiki/Data_flow_diagram (visited July 1, 2006).
-
Wikipedia, "Data Flow Diagram", available at: http://en.wikipedia.org/wiki/Data_flow_diagram (visited July 1, 2006).
-
-
-
|