메뉴 건너뛰기




Volumn , Issue , 2008, Pages 56-64

Towards privacy taxonomy-based attack tree analysis for the protection of consumer information privacy

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK TREE; ATTACK-TREE ANALYSIS; CONSUMER INFORMATION; INFORMATION PRIVACY; PRACTICAL IMPLEMENTATION; PRIVACY VIOLATION; PROTECTIVE MEASURES;

EID: 67650080222     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PST.2008.18     Document Type: Conference Paper
Times cited : (5)

References (28)
  • 3
    • 0002186644 scopus 로고    scopus 로고
    • Privacy-enhancing technologies: Typology, critique, vision
    • P.B. Agre, M. Rotenberg (eds) pp, The MIT Press
    • H. Burkert, "Privacy-enhancing technologies: typology, critique, vision", in Technology and Privacy: The New Landscape, P.B. Agre, M. Rotenberg (eds) pp. 125, The MIT Press (1998)
    • (1998) Technology and Privacy: The New Landscape , pp. 125
    • Burkert, H.1
  • 4
    • 67650024594 scopus 로고    scopus 로고
    • S. Byers, L.F. Cranor, D. Kormann, P. McDaniel, Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine, in Proc. 4th Workshop on Privacy Enhancing Technologies (PET2004), Toronto, Canada (2004)
    • S. Byers, L.F. Cranor, D. Kormann, P. McDaniel, "Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine", in Proc. 4th Workshop on Privacy Enhancing Technologies (PET2004), Toronto, Canada (2004)
  • 7
    • 35048870133 scopus 로고    scopus 로고
    • A. Daniel Oliver-Lalana, Consent as a Threat. A Critical Approach to Privacy Negotiation in e-Commerce Practices, in Lecture Notes in Computer Science, TrustBus 2004, 3184, pp. 110-119, S. Katsikas, J. Lopez, G. Pernel (eds.), Springer, Heidelberg (2004)
    • A. Daniel Oliver-Lalana, "Consent as a Threat. A Critical Approach to Privacy Negotiation in e-Commerce Practices", in Lecture Notes in Computer Science, TrustBus 2004, vol. 3184, pp. 110-119, S. Katsikas, J. Lopez, G. Pernel (eds.), Springer, Heidelberg (2004)
  • 11
    • 67650055748 scopus 로고    scopus 로고
    • Financial Intelligence Centre Act (FICA), Act 38 of 2001, Republic of South Africa
    • Financial Intelligence Centre Act (FICA), Act 38 of 2001, Republic of South Africa
  • 13
    • 0003706051 scopus 로고    scopus 로고
    • B.A. Garner ed, 7th Edition, West Publishing Company
    • B.A. Garner (ed), Black's Law Dictionary, 7th Edition, West Publishing Company (1999)
    • (1999) Black's Law Dictionary
  • 14
    • 0010888307 scopus 로고    scopus 로고
    • Does Privacy Law Work?
    • P.B. Agre, M. Rotenberg, eds pp, The MIT Press
    • R. Gellman, "Does Privacy Law Work?" in Technology and Privacy: The New Landscape, P.B. Agre, M. Rotenberg, (eds) pp. 194, The MIT Press (1998)
    • (1998) Technology and Privacy: The New Landscape , pp. 194
    • Gellman, R.1
  • 18
    • 79551580658 scopus 로고    scopus 로고
    • E. A. Martin, J. Law eds, 6th Edition, Oxford University Press
    • E. A. Martin, J. Law (eds), Oxford Dictionary of Law, 6th Edition, Oxford University Press (2006)
    • (2006) Oxford Dictionary of Law
  • 19
    • 33745849657 scopus 로고    scopus 로고
    • Foundations of Attack Trees
    • D. Won, S. Kim eds, Springer, Heidelberg
    • S. Mauw, M. Oostdijk, "Foundations of Attack Trees", in Lecture Notes in Computer Science, ICISC 2005, vol 3935, pp. 186-198, D. Won, S. Kim (eds.), Springer, Heidelberg (2006)
    • (2005) Lecture Notes in Computer Science, ICISC , vol.3935 , pp. 186-198
    • Mauw, S.1    Oostdijk, M.2
  • 20
    • 67650061925 scopus 로고    scopus 로고
    • The Effectiveness of Self-Regulated Privacy Protection
    • P.N. Bloom, G.T. Gundlach eds, pp, Sage Publications Inc
    • G.R. Milne, "The Effectiveness of Self-Regulated Privacy Protection", in Handbook of Marketing and Society, P.N. Bloom, G.T. Gundlach (eds), pp. 465, Sage Publications Inc. (2001)
    • (2001) Handbook of Marketing and Society , pp. 465
    • Milne, G.R.1
  • 24
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • December , Available at
    • B. Schneier, "Attack trees: Modeling security threats", Dr. Dobb's Journal, December (1999). Available at: http://www.schneier.com/ paper-attacktrees-ddj-ft.html
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 26
    • 67650039273 scopus 로고    scopus 로고
    • Privacy and Data Protection, Discussion Paper 109, Project 124, South African Law Reform Commission, pp.373, 376, Pretoria (2005), Available at http://www.doj.gov.za/salrc/dpapers.htm
    • Privacy and Data Protection, Discussion Paper 109, Project 124, South African Law Reform Commission, pp.373, 376, Pretoria (2005), Available at http://www.doj.gov.za/salrc/dpapers.htm
  • 28
    • 0003578535 scopus 로고
    • United Nations, Article 12, New York, USA, Available at
    • Universal Declaration of Human Rights, United Nations, Article 12, New York, USA, (1948), Available at http://www.un.org/Overview/rights.html
    • (1948) Universal Declaration of Human Rights


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.