메뉴 건너뛰기




Volumn , Issue , 2006, Pages

A collection of privacy design patterns

Author keywords

Anonymity; Privacy

Indexed keywords

ANONYMITY; COMPUTING POWER; DECISION MAKING PROCESS; DESIGN PATTERNS; ELECTRONIC CASH; GOVERNMENT AGENCIES; INTERNET ACCESS; LOCATION MONITORING; ON-LINE COMMUNICATION; ONLINE DATA; PRIVACY; PRIVACY DESIGN; PRIVACY INTRUSION; PRIVACY PROTECTING;

EID: 67449089020     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1415472.1415481     Document Type: Conference Paper
Times cited : (65)

References (36)
  • 1
    • 67449089883 scopus 로고    scopus 로고
    • Anonymizer.com. Online privacy services
    • Anonymizer.com. Online privacy services.
  • 2
    • 67449085257 scopus 로고    scopus 로고
    • Bell Labs Technology Demonstration. The Lucent personalized Web assistant
    • Bell Labs Technology Demonstration. The Lucent personalized Web assistant.
  • 3
    • 2942587015 scopus 로고    scopus 로고
    • Mix zones: User privacy in location-aware services
    • A. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. In PerCom Workshops, pages 127-131, 2004.
    • (2004) PerCom Workshops , pp. 127-131
    • Beresford, A.1    Stajano, F.2
  • 4
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 6
    • 2342617507 scopus 로고    scopus 로고
    • E-voting: Secret-ballot receipts: True voter-verif able elections
    • Jan./Feb
    • D. Chaum. E-voting: Secret-ballot receipts: True voter-verif able elections. IEEE Security and Privacy, 2(1):38-47, Jan./Feb. 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.1 , pp. 38-47
    • Chaum, D.1
  • 7
    • 67449098479 scopus 로고    scopus 로고
    • Computer Cryptology. APAS Anonymous remailer use, 2 Dec 2001. http:// www.faqs.org/faqs/privacy/anon-server/faq/use/part3/.
    • Computer Cryptology. APAS Anonymous remailer use, 2 Dec 2001. http:// www.faqs.org/faqs/privacy/anon-server/faq/use/part3/.
  • 10
    • 0017018484 scopus 로고    scopus 로고
    • W. Diff e and M. E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644-654, 1976.
    • W. Diff e and M. E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644-654, 1976.
  • 13
    • 0346530128 scopus 로고    scopus 로고
    • Privacy-enhancing technologies for the Internet, II: Five Years Later
    • International Workshop on Privacy Enhancing Technologies PET
    • I. Goldberg. Privacy-enhancing technologies for the Internet, II: Five Years Later. In International Workshop on Privacy Enhancing Technologies (PET), LNCS, volume 2, 2002.
    • (2002) LNCS , vol.2
    • Goldberg, I.1
  • 14
    • 0030644696 scopus 로고    scopus 로고
    • Privacy-enhancing technologies for the Internet
    • IEEE Computer Society Press, Feb
    • I. Goldberg, D. Wagner, and E. Brewer. Privacy-enhancing technologies for the Internet. In Proc. of 42nd IEEE Spring COMPCON. IEEE Computer Society Press, Feb. 1997.
    • (1997) Proc. of 42nd IEEE Spring COMPCON
    • Goldberg, I.1    Wagner, D.2    Brewer, E.3
  • 15
    • 84955557456 scopus 로고    scopus 로고
    • D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Hiding routing information. In R. Anderson, editor, Information hiding: first international workshop, Cambridge, U.K., May 30-June 1, 1996: proceedings, 1174 of ser-LNCS, pages 137-150, pub-SV:adr, 1996. pub-SV.
    • D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Hiding routing information. In R. Anderson, editor, Information hiding: first international workshop, Cambridge, U.K., May 30-June 1, 1996: proceedings, volume 1174 of ser-LNCS, pages 137-150, pub-SV:adr, 1996. pub-SV.
  • 18
    • 67449104950 scopus 로고    scopus 로고
    • J. J. Helsingius. The anon.penet.fi anonymous server. help f le, 1995.
    • J. J. Helsingius. The anon.penet.fi anonymous server. help f le, 1995.
  • 19
    • 67449096923 scopus 로고    scopus 로고
    • iProxy.net. iProxy anonymizer service. http://iproxy.net/.
    • iProxy.net. iProxy anonymizer service. http://iproxy.net/.
  • 20
    • 38049015823 scopus 로고    scopus 로고
    • General k-anonymization is hard
    • Technical Report CMU-CS-03-113, CMU, 2003
    • A. Meyerson and R. Williams. General k-anonymization is hard. Technical Report CMU-CS-03-113, CMU, 2003.
    • Meyerson, A.1    Williams, R.2
  • 22
    • 67449103311 scopus 로고    scopus 로고
    • R. Newman. The Church of Scientology vs. Grady Ward, 24 Jul 1996. http: //www.xs4all.nl/~kspaink/cos/rnewman/grady/home.html.
    • R. Newman. The Church of Scientology vs. Grady Ward, 24 Jul 1996. http: //www.xs4all.nl/~kspaink/cos/rnewman/grady/home.html.
  • 23
    • 67449104951 scopus 로고    scopus 로고
    • R. Newman. The Church of Scientology vs. anon.penet.fi - Julf Helsingius voluntarily closes his remailer after Finnish court orders him to turn over a user name to Scientology, 23 Mar 1997. http: //www.xs4all.nl/~kspaink/cos/ rnewman/anon/penet.html.
    • R. Newman. The Church of Scientology vs. anon.penet.fi - Julf Helsingius voluntarily closes his remailer after Finnish court orders him to turn over a user name to Scientology, 23 Mar 1997. http: //www.xs4all.nl/~kspaink/cos/ rnewman/anon/penet.html.
  • 24
    • 84937555451 scopus 로고
    • Networks without user observability - Design options
    • F. Pichler, editor, Advances in cryptology: Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT '85, of, Linz, Austria, Apr, Springer
    • A. Pf tzmann and M. Waidner. Networks without user observability - Design options. In F. Pichler, editor, Advances in cryptology: Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT '85), volume 219 of LNCS, pages 245-253, Linz, Austria, Apr. 1985. Springer.
    • (1985) LNCS , vol.219 , pp. 245-253
    • Pf tzmann, A.1    Waidner, M.2
  • 25
    • 67449101630 scopus 로고    scopus 로고
    • The f rst Internet war - The state of nature and the f rst Internet war: Scientology, its critics, anarchy, and law in Cyberspace
    • April
    • D. G. Post. The f rst Internet war - The state of nature and the f rst Internet war: Scientology, its critics, anarchy, and law in Cyberspace. Reason Magazine, April 1996.
    • (1996) Reason Magazine
    • Post, D.G.1
  • 34
    • 0344328867 scopus 로고    scopus 로고
    • US Department of Homeland Health Services Off ce for Civil Rights, May
    • US Department of Homeland Health Services Off ce for Civil Rights. Summary of the HIPAA privacy rule, May 2003.
    • (2003) Summary of the HIPAA privacy rule


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.