메뉴 건너뛰기




Volumn 50, Issue 5, 2008, Pages 375-382

Compliance monitor for early warning risk determination

Author keywords

Business compliance; Early warning system; Privacy; Risk indicator

Indexed keywords


EID: 57849117582     PISSN: 09376429     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11576-008-0079-0     Document Type: Article
Times cited : (12)

References (31)
  • 2
    • 44649131263 scopus 로고    scopus 로고
    • Accorsi, Rafael (2008): Automated Audits to Complement the Notion of Control for Identity Management. In: deLeeuw, Elisabeth; Fischer-Huebner, Simone; Iseng, Jimmy; Barking, John (Eds.): Policies and Research in Identity Management, 261 of IFIP, Springer, pp. 39-48.
    • Accorsi, Rafael (2008): Automated Audits to Complement the Notion of Control for Identity Management. In: deLeeuw, Elisabeth; Fischer-Huebner, Simone; Iseng, Jimmy; Barking, John (Eds.): Policies and Research in Identity Management, vol. 261 of IFIP, Springer, pp. 39-48.
  • 4
    • 10444267476 scopus 로고    scopus 로고
    • Bishop, Matt; Bhumiratana, Bhune; Crawford, Rick; Levitt, Carl (2004): How to Sanitize Data. In: Proceedings of the 13th IEEE International Workshops Infrastructure for Collaborative Enterprises, o.P, pp. 217-222.
    • Bishop, Matt; Bhumiratana, Bhune; Crawford, Rick; Levitt, Carl (2004): How to Sanitize Data. In: Proceedings of the 13th IEEE International Workshops Infrastructure for Collaborative Enterprises, o.P, pp. 217-222.
  • 5
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing Regulatory Rules for Privacy and Security Requirements
    • Breaux, Travis; Antón, Annie (2008): Analyzing Regulatory Rules for Privacy and Security Requirements. In: IEEE Transactions of Software Engineering 34 (1), pp. 5-20.
    • (2008) IEEE Transactions of Software Engineering , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.1    Antón, A.2
  • 6
    • 0142250282 scopus 로고    scopus 로고
    • Casassa-Mont, Marco; Pearson, Siani; Bramhall, Pete (2003): Towards Accountable Management of Privacy and Identity Information. In: Snekkenes, Einar; Gollmann, Dieter (Eds.): Proceedings of ESORICS, Lecture Notes in Computer Science 2808, Springer-Verlag, 146-161.
    • Casassa-Mont, Marco; Pearson, Siani; Bramhall, Pete (2003): Towards Accountable Management of Privacy and Identity Information. In: Snekkenes, Einar; Gollmann, Dieter (Eds.): Proceedings of ESORICS, Lecture Notes in Computer Science vol. 2808, Springer-Verlag, 146-161.
  • 7
    • 0000072558 scopus 로고
    • Finding a Needle in a Haystack- or Identifying Anonymous Census Record
    • Dalenius, Tore (1986): Finding a Needle in a Haystack- or Identifying Anonymous Census Record. In: Journal of Official Statistics 2 (3): pp. 329-336.
    • (1986) Journal of Official Statistics , vol.2 , Issue.3 , pp. 329-336
    • Dalenius, T.1
  • 11
    • 33646071594 scopus 로고    scopus 로고
    • Hilty, Manuel; Basin, David; Pretschner, Alexander (2005): On Obligations. In: di Vimercati, Sabrina; Syverson, Paul; Gollmann, Dieter (Eds.): Proceedings of the 10th ESORICS, Lecture Notes in Computer Science, 3679, Springer-Verlag, pp. 98-117.
    • Hilty, Manuel; Basin, David; Pretschner, Alexander (2005): On Obligations. In: di Vimercati, Sabrina; Syverson, Paul; Gollmann, Dieter (Eds.): Proceedings of the 10th ESORICS, Lecture Notes in Computer Science, vol. 3679, Springer-Verlag, pp. 98-117.
  • 12
    • 57849168420 scopus 로고    scopus 로고
    • HIPAA (2008): http://www.hipaa.org, retrieved on 2008-05-07.
    • HIPAA (2008): http://www.hipaa.org, retrieved on 2008-05-07.
  • 14
    • 84903166925 scopus 로고    scopus 로고
    • Extended Privacy Definition Tool
    • To appear in: Proceedings of 4th Multikonferenz Wirtschaftsinformatik, Munich
    • Kähmer, Martin; Gilliot, Maike (2008a): Extended Privacy Definition Tool. To appear in: Proceedings of 4th Multikonferenz Wirtschaftsinformatik, Lecture Notes in Informatics, Munich.
    • (2008) Lecture Notes in Informatics
    • Kähmer, M.1    Gilliot, M.2
  • 16
    • 0039015629 scopus 로고
    • Authentication in Distributed Systems: Theory and Practice
    • Lampson, Butler; Abadi, Martin; Burrows, Michael; Wobber, Edward (1991): Authentication in Distributed Systems: Theory and Practice. In: ACM Operating Systems Review 25 (5), pp. 165-182.
    • (1991) ACM Operating Systems Review , vol.25 , Issue.5 , pp. 165-182
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 19
    • 37249079159 scopus 로고    scopus 로고
    • Pretschner, Alexander; Massacci, Fabio; Hilty, Manuel (2007): Usage Control in Service-Oriented Architectures. In: Lambrinoudakis, Costas; Pernul; Günther; Tjoa, A Min (Eds.): Proceedings of the 4th TRUSTBUS, Lecture Notes in Computer Science, 4657, Springer-Verlag, pp. 83-93.
    • Pretschner, Alexander; Massacci, Fabio; Hilty, Manuel (2007): Usage Control in Service-Oriented Architectures. In: Lambrinoudakis, Costas; Pernul; Günther; Tjoa, A Min (Eds.): Proceedings of the 4th TRUSTBUS, Lecture Notes in Computer Science, vol. 4657, Springer-Verlag, pp. 83-93.
  • 21
    • 84956971202 scopus 로고    scopus 로고
    • Enforcing Obligations with Security Monitors
    • Qing, Sihan; Okamoto, Tatusaki; Zhou, Jianying: Proceedings of the the 3rd International Conference on Information and Communications Security, Springer-Verlag, pp
    • Ribeiro, Carlos; Zúquete, André; Ferreira, Paulo (2001): Enforcing Obligations with Security Monitors. In: Qing, Sihan; Okamoto, Tatusaki; Zhou, Jianying: Proceedings of the the 3rd International Conference on Information and Communications Security, Lecture Notes in Computer Science, vol. 2229, Springer-Verlag, pp. 172-176.
    • (2001) Lecture Notes in Computer Science , vol.2229 , pp. 172-176
    • Ribeiro, C.1    Zúquete, A.2    Ferreira, P.3
  • 22
    • 33748532138 scopus 로고    scopus 로고
    • Personalization in Privacy-Aware Highly Dynamic Systems
    • Sackmann, Stefan; Strüker, Jens; Accorsi, Rafael (2006): Personalization in Privacy-Aware Highly Dynamic Systems. In: Communications of the ACM 49 (9), pp. 32-38.
    • (2006) Communications of the ACM , vol.49 , Issue.9 , pp. 32-38
    • Sackmann, S.1    Strüker, J.2    Accorsi, R.3
  • 25
    • 57849158748 scopus 로고    scopus 로고
    • A model for Private Section Compliance in Information Security
    • Sorebo, Gib (2006): A model for Private Section Compliance in Information Security. In: IT Compliance Journal 2, pp. 7-14.
    • (2006) IT Compliance Journal , vol.2 , pp. 7-14
    • Sorebo, G.1
  • 26
    • 0011584005 scopus 로고    scopus 로고
    • Uniqueness of Simple Demographics in the U.S. Population
    • Laboratory for International Data Privacy, Pittsburgh
    • Sweeney, Latanya (2000): Uniqueness of Simple Demographics in the U.S. Population. Research Report in the Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh.
    • (2000) Research Report in the Carnegie Mellon University
    • Sweeney, L.1
  • 28
    • 34548569735 scopus 로고    scopus 로고
    • Minimum Unsafe and Maximum Safe Sets of Variables for Disclosure Risk Assessment of Individual Records in a Microdata Set
    • Takemura, Akimichi (2000): Minimum Unsafe and Maximum Safe Sets of Variables for Disclosure Risk Assessment of Individual Records in a Microdata Set. In: Journal Japan Statistics Society, 32 pp. 107-117.
    • (2000) Journal Japan Statistics Society , vol.32 , pp. 107-117
    • Takemura, A.1
  • 29
    • 57849120331 scopus 로고    scopus 로고
    • Current Trends in Theoretical Research of Statistical Disclosure Control Problem
    • Takemura, Akimichi (2003): Current Trends in Theoretical Research of Statistical Disclosure Control Problem. In: Proceedings of the Institute of Statistical Mathematics 51 (2), pp. 241-260.
    • (2003) Proceedings of the Institute of Statistical Mathematics , vol.51 , Issue.2 , pp. 241-260
    • Takemura, A.1
  • 31
    • 57849113982 scopus 로고    scopus 로고
    • Willenborg, Leon; de Waal, Ton
    • Elements of Statistical Disclosure Control, Springer-Verlag, New York
    • Willenborg, Leon; de Waal, Ton (2000): Elements of Statistical Disclosure Control. In: Lecture Notes in Statistics 155, Springer-Verlag, New York.
    • (2000) Lecture Notes in Statistics , vol.155


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.