메뉴 건너뛰기




Volumn , Issue , 2009, Pages 44-52

Taking account of privacy when designing cloud computing services

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; DESIGN PRINCIPLES; LEGAL COMPLIANCE; PRODUCTION ENVIRONMENTS; SOFTWARE ENGINEERS;

EID: 70349836055     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2009.5071532     Document Type: Conference Paper
Times cited : (397)

References (37)
  • 2
    • 71749089487 scopus 로고    scopus 로고
    • Cloud Computing's Stormy Side
    • 19 Feb 2008
    • A. Greenberg, "Cloud Computing's Stormy Side", Forbes Magazine, 19 Feb 2008. http://www.forbes.com/2008/02/17/web-application- cloud-tech-intel-cx-ag-0219cloud.html
    • Forbes Magazine
    • Greenberg, A.1
  • 4
    • 37349014592 scopus 로고    scopus 로고
    • Privacy Assurance: Bridging the Gap Between Preference and Practice
    • C. Lambrinoudakis, G. Pernul, A.M. Tjoa eds, Proc. TrustBus 2007, Springer-Verlag Berlin Heidelberg
    • T. E. Elahi and S. Pearson, "Privacy Assurance: Bridging the Gap Between Preference and Practice", C. Lambrinoudakis, G. Pernul, A.M. Tjoa (eds.), Proc. TrustBus 2007, LNCS 4657, Springer-Verlag Berlin Heidelberg, 2007, pp. 65-74.
    • (2007) LNCS , vol.4657 , pp. 65-74
    • Elahi, T.E.1    Pearson, S.2
  • 5
    • 70349797064 scopus 로고    scopus 로고
    • Version 2.1a, 26th April
    • Microsoft Corporation, "Privacy Guidelines for Developing Software Products and Services", Version 2.1a, 26th April 2007. http://www. microsoft.com/Downloads/details.aspx?FamilyID=c48cf80f-6e87-48f5-83ec- a18d1ad2fc1f&displaylang=en
    • (2007) Privacy Guidelines for Developing Software Products and Services
  • 6
    • 70349833881 scopus 로고    scopus 로고
    • Information Commissioners Office, Report, November
    • Information Commissioners Office, "Privacy by Design", Report, November 2008. www.ico.gov.uk
    • (2008) Privacy by Design
  • 8
    • 33644925852 scopus 로고    scopus 로고
    • A Taxonomy of Privacy
    • January
    • D.J. Solove, "A Taxonomy of Privacy", University of Pennyslavania Law Review, vol 154, no 3, January 2006, p. 477. http://papers.ssrn.com/so13/papers.cfm?abstract-id=667622
    • (2006) University of Pennyslavania Law Review , vol.154 , Issue.3 , pp. 477
    • Solove, D.J.1
  • 9
    • 77954780476 scopus 로고    scopus 로고
    • Clouded in uncertainty - the legal pitfalls of cloud computing
    • 24 Sept 2008
    • J. Salmon, "Clouded in uncertainty - the legal pitfalls of cloud computing", Computing, 24 Sept 2008. http://www.computing.co.uk/ computing/features/2226701/clouded-uncertainty-4229153
    • Computing
    • Salmon, J.1
  • 10
    • 70349800005 scopus 로고    scopus 로고
    • Trustguide2: An exploration of privacy preferences in an online world
    • P. Cunningham and M. Cunningham eds, IOS Press
    • A. Tweney and S. Crane, "Trustguide2: An exploration of privacy preferences in an online world", Expanding the Knowledge Economy: Issues, Applications, Case Studies, P. Cunningham and M. Cunningham (eds), IOS Press, 2007.
    • (2007) Expanding the Knowledge Economy: Issues, Applications, Case Studies
    • Tweney, A.1    Crane, S.2
  • 12
    • 42649112032 scopus 로고    scopus 로고
    • Privacy Online: Fair Information Practices in the Electronic Marketplace
    • Federal Trade Commission, Washington DC: FTC, May 22
    • Federal Trade Commission, Privacy Online: Fair Information Practices in the Electronic Marketplace: A Federal Trade Commission Report to Congress. Washington DC: FTC, May 22, 2000.
    • (2000) A Federal Trade Commission Report to Congress
  • 13
    • 70349793936 scopus 로고    scopus 로고
    • Organization for Economic Co-operation and Development (OECD), Guidelines governing the protection of privacy and transborder flows of personal data, Paris, 1980 and Guidelines for consumer protection for e-commerce, 1999. www.ftc.gov/opa/1999/9912/oecdguide.htm
    • Organization for Economic Co-operation and Development (OECD), "Guidelines governing the protection of privacy and transborder flows of personal data", Paris, 1980 and "Guidelines for consumer protection for e-commerce", 1999. www.ftc.gov/opa/1999/9912/oecdguide.htm
  • 15
    • 70349797065 scopus 로고    scopus 로고
    • Information Commissioner's Office, "PIA handbook", 2007. http://www.ico.gov.uk/
    • (2007) PIA handbook
  • 16
    • 70349836760 scopus 로고    scopus 로고
    • Office of the Privacy Commissioner of Canada
    • Office of the Privacy Commissioner of Canada, "Fact sheet: Privacy impact assessments", 2007. http://www.privcom.gc.ca/.
    • (2007) Fact sheet: Privacy impact assessments
  • 18
    • 70349805880 scopus 로고    scopus 로고
    • th6c
    • th6c
  • 20
    • 70349827661 scopus 로고    scopus 로고
    • L. Cranor, Web Privacy with P3P, O'Reilly & Associates, September 2002. ISBN 0-59600-371-4.
    • L. Cranor, Web Privacy with P3P, O'Reilly & Associates, September 2002. ISBN 0-59600-371-4.
  • 22
    • 70349803117 scopus 로고    scopus 로고
    • EXOCOM Group, Inc, August
    • EXOCOM Group, Inc., "Privacy Technology Review", August 2001. http://www.hc-sc.gc.ca/ohih-bsi/pubs/2001-tech/tech-e.html
    • (2001) Privacy Technology Review
  • 23
    • 35048824687 scopus 로고    scopus 로고
    • Law, PETs and Other Technologies for Privacy Protection
    • University of Warwick, February 28
    • J. Borking and C. Raab, "Law, PETs and Other Technologies for Privacy Protection." Journal of Information, Law and Technology, (University of Warwick), 2001 (1), February 28, 2001.
    • (2001) Journal of Information, Law and Technology , Issue.1
    • Borking, J.1    Raab, C.2
  • 24
    • 0013176783 scopus 로고    scopus 로고
    • IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms
    • Springer
    • S. Fischer-Hubner, IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms, LNCS 1958, Springer, 2001.
    • (2001) LNCS 1958
    • Fischer-Hubner, S.1
  • 25
    • 70349790672 scopus 로고    scopus 로고
    • Information Commissioners Office, November 2008. Available via
    • Information Commissioners Office, "Privacy by Design: An overview of privacy enhancing technologies", November 2008. Available via http://www.ico.gov.uk/upload/documents/pdb-report-html/pbd-pets-paper.pdf
    • Privacy by Design: An overview of privacy enhancing technologies
  • 26
    • 0003855464 scopus 로고    scopus 로고
    • New York: John Wiley & Sons, 2nd edition
    • B. Schneier, Applied Cryptography. New York: John Wiley & Sons, 2nd edition, 1996.
    • (1996) Applied Cryptography
    • Schneier, B.1
  • 27
    • 70349827660 scopus 로고    scopus 로고
    • Voltage, Format-Preserving Encryption, 2009. http://www.voltage.com/technology/Technology-FormatPreservingEncryption.htm
    • Voltage, "Format-Preserving Encryption", 2009. http://www.voltage.com/technology/Technology-FormatPreservingEncryption.htm
  • 28
    • 70349827658 scopus 로고    scopus 로고
    • A Client-Based Privacy Manager for Cloud Computing
    • M. Mowbray and S. Pearson, "A Client-Based Privacy Manager for Cloud Computing", HP Technical Report, 2009.
    • (2009) HP Technical Report
    • Mowbray, M.1    Pearson, S.2
  • 29
    • 33746437508 scopus 로고    scopus 로고
    • Privacy Preserving Data Mining
    • Y. Lindell, and B. Pinkas, "Privacy Preserving Data Mining", Journal of Cryptology, vol 15, no. 3, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.3
    • Lindell, Y.1    Pinkas, B.2
  • 30
    • 84942776290 scopus 로고    scopus 로고
    • Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services
    • IEEE Computer Society
    • M. Casassa-Mont, S. Pearson and P. Bramhall, "Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services", Proc. DEXA 2003, IEEE Computer Society, 2003, pp. 377-382.
    • (2003) Proc. DEXA 2003 , pp. 377-382
    • Casassa-Mont, M.1    Pearson, S.2    Bramhall, P.3
  • 31
    • 35248872156 scopus 로고    scopus 로고
    • A. Patrick and S. Kenny, From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions, R. Dingledine (ed.), PET 2003, LNCS 2760, pp. 107-124, Springer-Verlag Berlin Heidelberg, 2003.
    • A. Patrick and S. Kenny, "From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions", R. Dingledine (ed.), PET 2003, LNCS 2760, pp. 107-124, Springer-Verlag Berlin Heidelberg, 2003.
  • 34
    • 77956759866 scopus 로고    scopus 로고
    • D. Cohen, M. Lindvall and P. Costa, An introduction to agile methods, Advances in Computers, New York, Elsevier Science, 2004, pp. 1-66.
    • D. Cohen, M. Lindvall and P. Costa, "An introduction to agile methods", Advances in Computers, New York, Elsevier Science, 2004, pp. 1-66.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.