-
1
-
-
34548180601
-
Attacks on Inter Vehicle Communication Systems - an Analysis
-
Hamburg, Germany
-
A. Aijaz, B. Bochow, F. Dotzer, A. Festag, M. Gerlach, R. Kroh, T. Leinmuller, "Attacks on Inter Vehicle Communication Systems - an Analysis", in Proc 3rd International Workshop on Intelligent Transportation, Hamburg, Germany (2006)
-
(2006)
Proc 3rd International Workshop on Intelligent Transportation
-
-
Aijaz, A.1
Bochow, B.2
Dotzer, F.3
Festag, A.4
Gerlach, M.5
Kroh, R.6
Leinmuller, T.7
-
3
-
-
0002186644
-
Privacy-enhancing technologies: Typology, critique, vision
-
P.B. Agre, M. Rotenberg (eds) pp, The MIT Press
-
H. Burkert, "Privacy-enhancing technologies: typology, critique, vision", in Technology and Privacy: The New Landscape, P.B. Agre, M. Rotenberg (eds) pp. 125, The MIT Press (1998)
-
(1998)
Technology and Privacy: The New Landscape
, pp. 125
-
-
Burkert, H.1
-
4
-
-
67650024594
-
-
S. Byers, L.F. Cranor, D. Kormann, P. McDaniel, Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine, in Proc. 4th Workshop on Privacy Enhancing Technologies (PET2004), Toronto, Canada (2004)
-
S. Byers, L.F. Cranor, D. Kormann, P. McDaniel, "Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine", in Proc. 4th Workshop on Privacy Enhancing Technologies (PET2004), Toronto, Canada (2004)
-
-
-
-
7
-
-
35048870133
-
-
A. Daniel Oliver-Lalana, Consent as a Threat. A Critical Approach to Privacy Negotiation in e-Commerce Practices, in Lecture Notes in Computer Science, TrustBus 2004, 3184, pp. 110-119, S. Katsikas, J. Lopez, G. Pernel (eds.), Springer, Heidelberg (2004)
-
A. Daniel Oliver-Lalana, "Consent as a Threat. A Critical Approach to Privacy Negotiation in e-Commerce Practices", in Lecture Notes in Computer Science, TrustBus 2004, vol. 3184, pp. 110-119, S. Katsikas, J. Lopez, G. Pernel (eds.), Springer, Heidelberg (2004)
-
-
-
-
9
-
-
35148896736
-
Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security
-
Washington D.C, USA
-
K. Edge, G.C. Dalton, R.A. Raines, R.F. Mills, "Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security", in Proc Military Communications Conference 2006, Washington D.C., USA (2006)
-
(2006)
Proc Military Communications Conference 2006
-
-
Edge, K.1
Dalton, G.C.2
Raines, R.A.3
Mills, R.F.4
-
10
-
-
39749143545
-
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System
-
Hawaii, USA
-
K. Edge, R. Raines, M. Grimaila, R. Baldwin, R. Bennington, C. Reuter, "The Use of Attack and Protection Trees to Analyze Security for an Online Banking System", in Proc. 40th Hawaii International Conference on System Sciences, Hawaii, USA (2007)
-
(2007)
Proc. 40th Hawaii International Conference on System Sciences
-
-
Edge, K.1
Raines, R.2
Grimaila, M.3
Baldwin, R.4
Bennington, R.5
Reuter, C.6
-
11
-
-
67650055748
-
-
Financial Intelligence Centre Act (FICA), Act 38 of 2001, Republic of South Africa
-
Financial Intelligence Centre Act (FICA), Act 38 of 2001, Republic of South Africa
-
-
-
-
12
-
-
33947667471
-
From a formal privacy model to its implementation
-
Arlington, VA, USA
-
S. Fischer-Hübner, A. Ott, "From a formal privacy model to its implementation", in Proc. 21st National Information Systems Security Conference, Arlington, VA, USA (1998)
-
(1998)
Proc. 21st National Information Systems Security Conference
-
-
Fischer-Hübner, S.1
Ott, A.2
-
13
-
-
0003706051
-
-
B.A. Garner ed, 7th Edition, West Publishing Company
-
B.A. Garner (ed), Black's Law Dictionary, 7th Edition, West Publishing Company (1999)
-
(1999)
Black's Law Dictionary
-
-
-
14
-
-
0010888307
-
Does Privacy Law Work?
-
P.B. Agre, M. Rotenberg, eds pp, The MIT Press
-
R. Gellman, "Does Privacy Law Work?" in Technology and Privacy: The New Landscape, P.B. Agre, M. Rotenberg, (eds) pp. 194, The MIT Press (1998)
-
(1998)
Technology and Privacy: The New Landscape
, pp. 194
-
-
Gellman, R.1
-
15
-
-
34548145633
-
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
-
Vienna, Austria
-
C. Kalloniatis, E. Kavakli, S. Gritzalis, "Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process", in Proc 2nd International Conference on Availability, Reliability and Security, Vienna, Austria (2007)
-
(2007)
Proc 2nd International Conference on Availability, Reliability and Security
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
18
-
-
79551580658
-
-
E. A. Martin, J. Law eds, 6th Edition, Oxford University Press
-
E. A. Martin, J. Law (eds), Oxford Dictionary of Law, 6th Edition, Oxford University Press (2006)
-
(2006)
Oxford Dictionary of Law
-
-
-
19
-
-
33745849657
-
Foundations of Attack Trees
-
D. Won, S. Kim eds, Springer, Heidelberg
-
S. Mauw, M. Oostdijk, "Foundations of Attack Trees", in Lecture Notes in Computer Science, ICISC 2005, vol 3935, pp. 186-198, D. Won, S. Kim (eds.), Springer, Heidelberg (2006)
-
(2005)
Lecture Notes in Computer Science, ICISC
, vol.3935
, pp. 186-198
-
-
Mauw, S.1
Oostdijk, M.2
-
20
-
-
67650061925
-
The Effectiveness of Self-Regulated Privacy Protection
-
P.N. Bloom, G.T. Gundlach eds, pp, Sage Publications Inc
-
G.R. Milne, "The Effectiveness of Self-Regulated Privacy Protection", in Handbook of Marketing and Society, P.N. Bloom, G.T. Gundlach (eds), pp. 465, Sage Publications Inc. (2001)
-
(2001)
Handbook of Marketing and Society
, pp. 465
-
-
Milne, G.R.1
-
23
-
-
67650027660
-
Privacy Capability Maturity Models within Telecommunications Organisations
-
Mauritius, published electronically
-
K. Reddy, H.S. Venter, "Privacy Capability Maturity Models within Telecommunications Organisations", in Proc of the Southern African Telecommunication Networks and Applications Conference 2007, Sugar Beach, Mauritius, published electronically (2007)
-
(2007)
Proc of the Southern African Telecommunication Networks and Applications Conference 2007, Sugar Beach
-
-
Reddy, K.1
Venter, H.S.2
-
24
-
-
0002670359
-
Attack trees: Modeling security threats
-
December , Available at
-
B. Schneier, "Attack trees: Modeling security threats", Dr. Dobb's Journal, December (1999). Available at: http://www.schneier.com/ paper-attacktrees-ddj-ft.html
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
26
-
-
67650039273
-
-
Privacy and Data Protection, Discussion Paper 109, Project 124, South African Law Reform Commission, pp.373, 376, Pretoria (2005), Available at http://www.doj.gov.za/salrc/dpapers.htm
-
Privacy and Data Protection, Discussion Paper 109, Project 124, South African Law Reform Commission, pp.373, 376, Pretoria (2005), Available at http://www.doj.gov.za/salrc/dpapers.htm
-
-
-
-
28
-
-
0003578535
-
-
United Nations, Article 12, New York, USA, Available at
-
Universal Declaration of Human Rights, United Nations, Article 12, New York, USA, (1948), Available at http://www.un.org/Overview/rights.html
-
(1948)
Universal Declaration of Human Rights
-
-
|