-
1
-
-
24944578141
-
Enterprise privacy authorization language (EPAL)
-
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL). Technical Report 3485, IBM (2003)
-
(2003)
Technical Report 3485, IBM
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
2
-
-
11244302711
-
Unification in privacy policy evaluation - Translating EPAL into prolog
-
Proceedings - Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2004
-
Backes, M., Durmuth, M., Karjoth, G.: Unification in privacy policy evaluation-translating EPAL into Prolog. In: Fifth IEEE Int. Workshop on Policies for Distributed Systems and Networks (POLICY 2004) (2004) (Pubitemid 40061198)
-
(2004)
Proceedings - Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2004
, pp. 185-188
-
-
Backes, M.1
Durmutht, M.2
Karjoth, G.3
-
3
-
-
0142157015
-
A Toolkit for Managing Enterprise Privacy Policies
-
Computer Security - ESORICS 2003
-
Backes, M., Pfitzmann, B., Schunter, M.: A toolkit for managing enterprise privacy policies. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.2808, pp. 162-180. Springer, Heidelberg (2003) (Pubitemid 37311869)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2808
, pp. 162-180
-
-
Backes, M.1
Pfitzmann, B.2
Schunter, M.3
-
4
-
-
84886759018
-
A Contractual Approach to Data Privacy
-
Bibas, S.A.: A contractual approach to data privacy. Harvard Journal of Law and Public Policy, 17 (1994) (Pubitemid 24795082)
-
(1994)
Harvard Journal of Law and Public Policy
, vol.17
, Issue.2
, pp. 591
-
-
Bibas, S.A.1
-
6
-
-
33744985815
-
Deriving semantic models from privacy policies
-
DOI 10.1109/POLICY.2005.12, 1454304, Proceedings - Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005
-
Breaux, T.D., Anton, A.I.: Deriving semantics models from privacy principles. In: Sixth IEEE Int. Workshop on Policies for Distributed Systems and Networks (POLICY 2005) (Pubitemid 43861249)
-
(2005)
Proceedings - Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005
, vol.2005
, pp. 67-76
-
-
Breaux, T.D.1
Anton, A.I.2
-
8
-
-
34250717425
-
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
-
DOI 10.1145/1143120.1143123, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
-
Brodie, C.A., Karat, C.-M., Karat, J.: An empirical study of natural language parsing of privacy policy rules using the Sparcle policy workbench. In: Symposium On Usable Privacy and Security (SOUPS) (2006) (Pubitemid 46966965)
-
(2006)
ACM International Conference Proceeding Series
, vol.149
, pp. 8-19
-
-
Brodie, C.A.1
Karat, C.-M.2
Karat, J.3
-
9
-
-
33745005053
-
An audit logic for accountability
-
DOI 10.1109/POLICY.2005.5, 1454301, Proceedings - Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005
-
Cederquist, J.G., Corin, R., Dekker, M., Etalle, S., Den Hartog, J.: An audit logic for accountability. In: Sixth IEEE Int.Workshop on Policies for Distributed Systems and Networks (POLICY 2005) (2005) (Pubitemid 43861246)
-
(2005)
Proceedings - Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005
, vol.2005
, pp. 34-43
-
-
Cederquist, J.G.1
Corin, R.2
Dekker, M.A.C.3
Etalle, S.4
Den Hartog, J.I.5
-
10
-
-
84979828319
-
Intelligent agents and intentionality: should we begin to think outsiDe the box?
-
Dehiyat, E.: Intelligent agents and intentionality: should we begin to think outsiDe the box? Computer Law and Security Report 22(1), 472-482 (2006)
-
(2006)
Computer Law and Security Report
, vol.22
, Issue.1
, pp. 472-482
-
-
Dehiyat, E.1
-
12
-
-
84979726076
-
Electronic contracts and software agents
-
Finocchiaro, G.: Electronic contracts and software agents. Computer Law and Security Report 19(1), 20-24 (2003)
-
(2003)
Computer Law and Security Report
, vol.19
, Issue.1
, pp. 20-24
-
-
Finocchiaro, G.1
-
13
-
-
24344463958
-
A formal privacy system and its application to location based services
-
Privacy Enhancing Technologies - 4th International Workshop, PET 2004
-
Gunter, C., May, M.J., Stubblebine, S.: A formal privacy system and its application to location based services. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.3424, pp. 256-282. Springer, Heidelberg (2005) (Pubitemid 41252009)
-
(2005)
Lecture Notes in Computer Science
, vol.3424
, pp. 256-282
-
-
Gunter, C.A.1
May, M.J.2
Stubblebine, S.G.3
-
14
-
-
0003269223
-
Health Insurance Portability Accountability Act
-
Health Resources and Services Administration
-
Health Resources and Services Administration. Health Insurance Portability and Accountability Act. Public Law, 104-191 (1996)
-
(1996)
Public Law
, pp. 104-191
-
-
-
16
-
-
34748857909
-
DUKE - Distributed usage control enforcement
-
DOI 10.1109/POLICY.2007.17, 4262601, Proceedings - Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007
-
Hilty,M., Pretschner, A., Basin, D., Schaefer, C.,Walter, T.: A policy language for distributed usage control. In: Biskup, J., Ĺopez, J. (eds.) ESORICS 2007. LNCS, vol.4734, pp. 531-546. Springer, Heidelberg (2007) (Pubitemid 47469575)
-
(2007)
Proceedings - Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007
, pp. 275
-
-
Hilty, M.1
Pretschner, A.2
Schaefer, C.3
Walter, T.4
-
17
-
-
19944382845
-
Privacy in information technology: Designing to enable privacy policy management in organizations
-
DOI 10.1016/j.ijhcs.2005.04.011, PII S1071581905000649, HCI Research in Privacy and Security
-
Karat, J., Karat, C.-M., Brodie, C.A., Feng, J.: Privacy in information technology: designing to enable privacy policy management in organizations. Int. Journal on Human-Computer Studies 63 (2005) (Pubitemid 40753497)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 153-174
-
-
Karat, J.1
Karat, C.-M.2
Brodie, C.3
Feng, J.4
-
19
-
-
33749080082
-
Logic-based regulation compliance-assistance
-
Kerrigan, S., Law, K.H.: Logic-based regulation compliance-assistance. In: ICAIL 2003 (2003)
-
(2003)
ICAIL 2003
-
-
Kerrigan, S.1
Law, K.H.2
-
20
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
In: Borriello, G., Holmquist, L.E. (eds.). LNCS. Springer, Heidelberg
-
Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.2498, pp. 237-245. Springer, Heidelberg (2002)
-
(2002)
UbiComp 2002
, vol.2498
, pp. 237-245
-
-
Langheinrich, M.1
-
21
-
-
33748527035
-
Personal privacy in ubiquitous computing
-
Dissertation Document ETH 16100
-
Langheinrich, M.: Personal privacy in ubiquitous computing. Tools and system support. Dissertation Document ETH 16100 (2005)
-
(2005)
Tools and system support
-
-
Langheinrich, M.1
-
23
-
-
34547330379
-
A semantics-based approach to privacy languages
-
Li,N., Yu, T., Anton, A.: A semantics-based approach to privacy languages. Technical Report 2003-28, CERIAS (2003)
-
Technical Report 2003-28, CERIAS (2003)
-
-
Li, N.1
Yu, T.2
Anton, A.3
-
24
-
-
33947620690
-
Privacy APIs: Access control techniques to analyze and verify legal privacy policies
-
DOI 10.1109/CSFW.2006.24, 1648710, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
-
May, M.J., Gunter, C., Lee, I.: Privacy APIs: Access control techniques to analyze and verify legal privacy policies. In: Computer Security Foundations Workshop (CSFW) (2006) (Pubitemid 46499719)
-
(2006)
Proceedings of the Computer Security Foundations Workshop
, vol.2006
, pp. 85-97
-
-
May, M.J.1
Gunter, C.A.2
Lee, I.3
-
26
-
-
67650669424
-
EPAL translation of the freedom of information and protection of privacy act
-
Powers, C., Adler, S., Wishart, B.: EPAL translation of the freedom of information and protection of privacy act. Technical Report Version 1.1, Tivoli Software, IBM (2004)
-
(2004)
Technical Report Version 1.1 Tivoli Software IBM
-
-
Powers, C.1
Adler, S.2
Wishart, B.3
-
27
-
-
67650676193
-
Privacy, data protection, and the unprecedented challenges of ambient intelligence
-
Rouvroy, A.: Privacy, data protection, and the unprecedented challenges of ambient intelligence. Social Science Research Network (2007)
-
(2007)
Social Science Research Network
-
-
Rouvroy, A.1
-
28
-
-
67650655042
-
The European Parliament and the Council of the European Union. UE directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
The European Parliament and the Council of the European Union. UE directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities (1995)
-
(1995)
Official Journal of the European Communities
-
-
-
30
-
-
67650651368
-
Platform for privacy preferences (P3P)
-
W3C. Platform for privacy preferences (P3P).W3C recommendation. Technical report,W3C (2002), http://www.w3.org
-
(2002)
W3C recommendation. Technical report,W3C
-
-
|