-
1
-
-
33748570319
-
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems
-
Springer-Verlag, pp
-
Accorsi, Rafael (2006): On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. In: Fischer-Huebner, Simone; Rannenberg, Kai; Yngstroem, Louise; Lindskog, Stefan (Eds.): International Federation for Information Processing, Security and Privacy in Dynamic Environments vol. 2001, Springer-Verlag, pp. 329-339.
-
(2006)
Fischer-Huebner, Simone; Rannenberg, Kai; Yngstroem, Louise; Lindskog, Stefan (Eds.): International Federation for Information Processing. Security and Privacy in Dynamic Environments vol. 2001
, pp. 329-339
-
-
Accorsi, R.1
-
2
-
-
44649131263
-
-
Accorsi, Rafael (2008): Automated Audits to Complement the Notion of Control for Identity Management. In: deLeeuw, Elisabeth; Fischer-Huebner, Simone; Iseng, Jimmy; Barking, John (Eds.): Policies and Research in Identity Management, 261 of IFIP, Springer, pp. 39-48.
-
Accorsi, Rafael (2008): Automated Audits to Complement the Notion of Control for Identity Management. In: deLeeuw, Elisabeth; Fischer-Huebner, Simone; Iseng, Jimmy; Barking, John (Eds.): Policies and Research in Identity Management, vol. 261 of IFIP, Springer, pp. 39-48.
-
-
-
-
3
-
-
24944578141
-
Enterprise Privacy Authorization Language
-
IBM, Zurich
-
Ashley, Paul; Hada, Satoshi; Karjoth, Guenter; Powers, Calvin; Schunter, Matthias (2003): Enterprise Privacy Authorization Language. IBM Research Report, IBM, Zurich.
-
(2003)
IBM Research Report
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
4
-
-
10444267476
-
-
Bishop, Matt; Bhumiratana, Bhune; Crawford, Rick; Levitt, Carl (2004): How to Sanitize Data. In: Proceedings of the 13th IEEE International Workshops Infrastructure for Collaborative Enterprises, o.P, pp. 217-222.
-
Bishop, Matt; Bhumiratana, Bhune; Crawford, Rick; Levitt, Carl (2004): How to Sanitize Data. In: Proceedings of the 13th IEEE International Workshops Infrastructure for Collaborative Enterprises, o.P, pp. 217-222.
-
-
-
-
5
-
-
40449096076
-
Analyzing Regulatory Rules for Privacy and Security Requirements
-
Breaux, Travis; Antón, Annie (2008): Analyzing Regulatory Rules for Privacy and Security Requirements. In: IEEE Transactions of Software Engineering 34 (1), pp. 5-20.
-
(2008)
IEEE Transactions of Software Engineering
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.1
Antón, A.2
-
6
-
-
0142250282
-
-
Casassa-Mont, Marco; Pearson, Siani; Bramhall, Pete (2003): Towards Accountable Management of Privacy and Identity Information. In: Snekkenes, Einar; Gollmann, Dieter (Eds.): Proceedings of ESORICS, Lecture Notes in Computer Science 2808, Springer-Verlag, 146-161.
-
Casassa-Mont, Marco; Pearson, Siani; Bramhall, Pete (2003): Towards Accountable Management of Privacy and Identity Information. In: Snekkenes, Einar; Gollmann, Dieter (Eds.): Proceedings of ESORICS, Lecture Notes in Computer Science vol. 2808, Springer-Verlag, 146-161.
-
-
-
-
7
-
-
0000072558
-
Finding a Needle in a Haystack- or Identifying Anonymous Census Record
-
Dalenius, Tore (1986): Finding a Needle in a Haystack- or Identifying Anonymous Census Record. In: Journal of Official Statistics 2 (3): pp. 329-336.
-
(1986)
Journal of Official Statistics
, vol.2
, Issue.3
, pp. 329-336
-
-
Dalenius, T.1
-
9
-
-
33745329295
-
Computability Classes for Enforcement Mechanisms
-
Hamlen, Kevin; Morrisett, Greg; Schneider, Fred (2006): Computability Classes for Enforcement Mechanisms. In: ACM Transactions on Programming Languages and Systems 28 (1), pp. 175-205.
-
(2006)
ACM Transactions on Programming Languages and Systems
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.1
Morrisett, G.2
Schneider, F.3
-
11
-
-
33646071594
-
-
Hilty, Manuel; Basin, David; Pretschner, Alexander (2005): On Obligations. In: di Vimercati, Sabrina; Syverson, Paul; Gollmann, Dieter (Eds.): Proceedings of the 10th ESORICS, Lecture Notes in Computer Science, 3679, Springer-Verlag, pp. 98-117.
-
Hilty, Manuel; Basin, David; Pretschner, Alexander (2005): On Obligations. In: di Vimercati, Sabrina; Syverson, Paul; Gollmann, Dieter (Eds.): Proceedings of the 10th ESORICS, Lecture Notes in Computer Science, vol. 3679, Springer-Verlag, pp. 98-117.
-
-
-
-
12
-
-
57849168420
-
-
HIPAA (2008): http://www.hipaa.org, retrieved on 2008-05-07.
-
HIPAA (2008): http://www.hipaa.org, retrieved on 2008-05-07.
-
-
-
-
14
-
-
84903166925
-
Extended Privacy Definition Tool
-
To appear in: Proceedings of 4th Multikonferenz Wirtschaftsinformatik, Munich
-
Kähmer, Martin; Gilliot, Maike (2008a): Extended Privacy Definition Tool. To appear in: Proceedings of 4th Multikonferenz Wirtschaftsinformatik, Lecture Notes in Informatics, Munich.
-
(2008)
Lecture Notes in Informatics
-
-
Kähmer, M.1
Gilliot, M.2
-
16
-
-
0039015629
-
Authentication in Distributed Systems: Theory and Practice
-
Lampson, Butler; Abadi, Martin; Burrows, Michael; Wobber, Edward (1991): Authentication in Distributed Systems: Theory and Practice. In: ACM Operating Systems Review 25 (5), pp. 165-182.
-
(1991)
ACM Operating Systems Review
, vol.25
, Issue.5
, pp. 165-182
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
17
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, Ashwin; Kifer, Daniel; Gehrke, Johannes; Venkitasubramaniam, Muthuramakrishnan (2007): L-diversity: Privacy beyond k-anonymity. In ACM Transactions of Knowledge Discovery Data 1 (1), pp. 1-52.
-
(2007)
In ACM Transactions of Knowledge Discovery Data
, vol.1
, Issue.1
, pp. 1-52
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
19
-
-
37249079159
-
-
Pretschner, Alexander; Massacci, Fabio; Hilty, Manuel (2007): Usage Control in Service-Oriented Architectures. In: Lambrinoudakis, Costas; Pernul; Günther; Tjoa, A Min (Eds.): Proceedings of the 4th TRUSTBUS, Lecture Notes in Computer Science, 4657, Springer-Verlag, pp. 83-93.
-
Pretschner, Alexander; Massacci, Fabio; Hilty, Manuel (2007): Usage Control in Service-Oriented Architectures. In: Lambrinoudakis, Costas; Pernul; Günther; Tjoa, A Min (Eds.): Proceedings of the 4th TRUSTBUS, Lecture Notes in Computer Science, vol. 4657, Springer-Verlag, pp. 83-93.
-
-
-
-
21
-
-
84956971202
-
Enforcing Obligations with Security Monitors
-
Qing, Sihan; Okamoto, Tatusaki; Zhou, Jianying: Proceedings of the the 3rd International Conference on Information and Communications Security, Springer-Verlag, pp
-
Ribeiro, Carlos; Zúquete, André; Ferreira, Paulo (2001): Enforcing Obligations with Security Monitors. In: Qing, Sihan; Okamoto, Tatusaki; Zhou, Jianying: Proceedings of the the 3rd International Conference on Information and Communications Security, Lecture Notes in Computer Science, vol. 2229, Springer-Verlag, pp. 172-176.
-
(2001)
Lecture Notes in Computer Science
, vol.2229
, pp. 172-176
-
-
Ribeiro, C.1
Zúquete, A.2
Ferreira, P.3
-
22
-
-
33748532138
-
Personalization in Privacy-Aware Highly Dynamic Systems
-
Sackmann, Stefan; Strüker, Jens; Accorsi, Rafael (2006): Personalization in Privacy-Aware Highly Dynamic Systems. In: Communications of the ACM 49 (9), pp. 32-38.
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 32-38
-
-
Sackmann, S.1
Strüker, J.2
Accorsi, R.3
-
23
-
-
57849095396
-
An Anonymization Technique with Considering Identification Risk
-
Japan, pp
-
Sato, Yoshinori; Kawasaki, Akihiko (2007): An Anonymization Technique with Considering Identification Risk. In: Proceedings of Multimedia, Distributed, Cooperative, and Mobile Symposium, Japan, pp.1182-1189.
-
(2007)
Proceedings of Multimedia, Distributed, Cooperative, and Mobile Symposium
, pp. 1182-1189
-
-
Sato, Y.1
Kawasaki, A.2
-
25
-
-
57849158748
-
A model for Private Section Compliance in Information Security
-
Sorebo, Gib (2006): A model for Private Section Compliance in Information Security. In: IT Compliance Journal 2, pp. 7-14.
-
(2006)
IT Compliance Journal
, vol.2
, pp. 7-14
-
-
Sorebo, G.1
-
26
-
-
0011584005
-
Uniqueness of Simple Demographics in the U.S. Population
-
Laboratory for International Data Privacy, Pittsburgh
-
Sweeney, Latanya (2000): Uniqueness of Simple Demographics in the U.S. Population. Research Report in the Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh.
-
(2000)
Research Report in the Carnegie Mellon University
-
-
Sweeney, L.1
-
28
-
-
34548569735
-
Minimum Unsafe and Maximum Safe Sets of Variables for Disclosure Risk Assessment of Individual Records in a Microdata Set
-
Takemura, Akimichi (2000): Minimum Unsafe and Maximum Safe Sets of Variables for Disclosure Risk Assessment of Individual Records in a Microdata Set. In: Journal Japan Statistics Society, 32 pp. 107-117.
-
(2000)
Journal Japan Statistics Society
, vol.32
, pp. 107-117
-
-
Takemura, A.1
-
29
-
-
57849120331
-
Current Trends in Theoretical Research of Statistical Disclosure Control Problem
-
Takemura, Akimichi (2003): Current Trends in Theoretical Research of Statistical Disclosure Control Problem. In: Proceedings of the Institute of Statistical Mathematics 51 (2), pp. 241-260.
-
(2003)
Proceedings of the Institute of Statistical Mathematics
, vol.51
, Issue.2
, pp. 241-260
-
-
Takemura, A.1
-
31
-
-
57849113982
-
Willenborg, Leon; de Waal, Ton
-
Elements of Statistical Disclosure Control, Springer-Verlag, New York
-
Willenborg, Leon; de Waal, Ton (2000): Elements of Statistical Disclosure Control. In: Lecture Notes in Statistics 155, Springer-Verlag, New York.
-
(2000)
Lecture Notes in Statistics
, vol.155
-
-
|