메뉴 건너뛰기




Volumn 5931 LNCS, Issue , 2009, Pages 131-144

Accountability as a way forward for privacy protection in the cloud

Author keywords

Accountability; Cloud computing; Privacy

Indexed keywords

CLOUD COMPUTING; PRIVACY AND SECURITY; PRIVACY PROTECTION; TECHNICAL SOLUTIONS;

EID: 71749090060     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10665-1_12     Document Type: Conference Paper
Times cited : (121)

References (57)
  • 1
    • 71749102938 scopus 로고    scopus 로고
    • HP cloud website, http://h71028.www7.hp.com/enterprise/us/en/ technologies/cloud-computing.html?jumpid=ex-r2858-us/en/large/tsg/go-cloud
    • HP cloud website
  • 2
    • 70349836055 scopus 로고    scopus 로고
    • Pearson, S.: Taking Account of Privacy when Designing Cloud Computing Services. In: ICSE-Cloud 2009, Vancouver. IEEE, Los Alamitos (2009); HP Labs Technical Report, HPL-2009-54 (2009), http://www.hpl.hp.com/techreports/2009/ HPL-2009-54.html
    • Pearson, S.: Taking Account of Privacy when Designing Cloud Computing Services. In: ICSE-Cloud 2009, Vancouver. IEEE, Los Alamitos (2009); HP Labs Technical Report, HPL-2009-54 (2009), http://www.hpl.hp.com/techreports/2009/ HPL-2009-54.html
  • 4
    • 71749113519 scopus 로고    scopus 로고
    • Council Directive 95/46/EC: On the protection of individuals with regard to the processing of personal data and on the free movement of such data. OJ, L281, pp. 31-50 (1995)
    • Council Directive 95/46/EC: On the protection of individuals with regard to the processing of personal data and on the free movement of such data. OJ, L281, pp. 31-50 (1995)
  • 7
    • 71749093388 scopus 로고    scopus 로고
    • Gellman, R.: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing. World Privacy Forum (2009), http://www.worldprivacyforum. org/pdf/WPF-Cloud-Privacy-Report.pdf
    • Gellman, R.: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing. World Privacy Forum (2009), http://www.worldprivacyforum. org/pdf/WPF-Cloud-Privacy-Report.pdf
  • 10
    • 71749114467 scopus 로고    scopus 로고
    • The Fog over the Grimpen Mire: Cloud Computing and the Law
    • Technology and Society , April
    • Mowbray, M.: The Fog over the Grimpen Mire: Cloud Computing and the Law. Script-ed Journal of Law, Technology and Society 6(1) (April 2009)
    • (2009) Script-ed Journal of Law , vol.6 , Issue.1
    • Mowbray, M.1
  • 11
    • 34147168694 scopus 로고    scopus 로고
    • The Sarbanes-Oxley Act: Implications for large-scale IT outsourcing
    • Hall, J.A., Liedtka, S.L.: The Sarbanes-Oxley Act: implications for large-scale IT outsourcing. Communications of the ACM 50(3), 95-100 (2007)
    • (2007) Communications of the ACM , vol.50 , Issue.3 , pp. 95-100
    • Hall, J.A.1    Liedtka, S.L.2
  • 12
    • 36349030850 scopus 로고    scopus 로고
    • Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services
    • IEEE, Los Alamitos
    • McKinley, P.K., Samimi, F.A., Shapiro, J.K., Chiping, T.: Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services. In: Dependable, Autonomic and Secure Computing, pp. 341-348. IEEE, Los Alamitos (2006)
    • (2006) Dependable, Autonomic and Secure Computing , pp. 341-348
    • McKinley, P.K.1    Samimi, F.A.2    Shapiro, J.K.3    Chiping, T.4
  • 14
    • 71749083235 scopus 로고    scopus 로고
    • Information Commissioners Office: Privacy by Design, Report (2008), http://www.ico.gov.uk
    • Information Commissioners Office: Privacy by Design, Report (2008), http://www.ico.gov.uk
  • 16
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as Contextual Integrity
    • Nissenbaum, H.: Privacy as Contextual Integrity. Washington Law Review 79(1), 119-158 (2004)
    • (2004) Washington Law Review , vol.79 , Issue.1 , pp. 119-158
    • Nissenbaum, H.1
  • 17
    • 71749091719 scopus 로고    scopus 로고
    • 6, P.: Who wants privacy protection, and what do they want? Journal of Consumer Behaviour 2(1), 80-100 (2002)
    • 6, P.: Who wants privacy protection, and what do they want? Journal of Consumer Behaviour 2(1), 80-100 (2002)
  • 19
    • 71749111193 scopus 로고    scopus 로고
    • UK Information Commissioner's Office A Report on the Surveillance Society
    • UK Information Commissioner's Office A Report on the Surveillance Society (2006)
    • (2006)
  • 21
    • 0041656265 scopus 로고    scopus 로고
    • Charlesworth, A.: Information Privacy Law in the European Union: E. Pluribus Unum. or Ex. Uno. Plures. Hastings Law Review 54, 931-969 (2003)
    • Charlesworth, A.: Information Privacy Law in the European Union: E. Pluribus Unum. or Ex. Uno. Plures. Hastings Law Review 54, 931-969 (2003)
  • 24
    • 71749108242 scopus 로고    scopus 로고
    • Protecting Consumer Privacy in the Company's Best Interest
    • Dolnicar, S., Jordaan, Y.: Protecting Consumer Privacy in the Company's Best Interest. Australasian Marketing Journal 14(1), 39-61 (2006)
    • (2006) Australasian Marketing Journal , vol.14 , Issue.1 , pp. 39-61
    • Dolnicar, S.1    Jordaan, Y.2
  • 25
    • 70349800005 scopus 로고    scopus 로고
    • Trustguide2: An exploration of privacy preferences in an online world
    • Cunningham, P, Cunningham, M, eds, IOS Press, Amsterdam
    • Tweney, A., Crane, S.: Trustguide2: An exploration of privacy preferences in an online world. In: Cunningham, P., Cunningham, M. (eds.) Expanding the Knowledge Economy. IOS Press, Amsterdam (2007)
    • (2007) Expanding the Knowledge Economy
    • Tweney, A.1    Crane, S.2
  • 27
    • 71749101693 scopus 로고    scopus 로고
    • Truste: Website (2009), http://www.truste.org/
    • (2009) Website
  • 28
    • 71749089894 scopus 로고    scopus 로고
    • SLA@SOI: Website (2009), http://sla-at-soi.eu/
    • (2009) SLA@SOI: Website
  • 30
    • 33745921913 scopus 로고    scopus 로고
    • Dealing with privacy obligations: Important aspects and technical approaches
    • Katsikas, S.K, López, J, Pernul, G, eds, TrustBus 2004, Springer, Heidelberg
    • Casassa Mont, M.: Dealing with privacy obligations: Important aspects and technical approaches. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 120-131. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3184 , pp. 120-131
    • Casassa Mont, M.1
  • 31
    • 72249098337 scopus 로고    scopus 로고
    • A Client-Based Privacy Manager for Cloud Computing
    • ACM, New York
    • Mowbray, M., Pearson, S.: A Client-Based Privacy Manager for Cloud Computing. In: Proc. COMSWARE 2009. ACM, New York (2009)
    • (2009) Proc. COMSWARE
    • Mowbray, M.1    Pearson, S.2
  • 32
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • IEEE, Los Alamitos
    • Yao, A.C.: How to Generate and Exchange Secrets. In: Proc. FoCS, pp. 162-167. IEEE, Los Alamitos (1986)
    • (1986) Proc. FoCS , pp. 162-167
    • Yao, A.C.1
  • 33
    • 71749120470 scopus 로고    scopus 로고
    • IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2 (2004), http://www.zurich.ibm.com/security/enterprise- privacy/epal/
    • IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2 (2004), http://www.zurich.ibm.com/security/enterprise- privacy/epal/
  • 34
    • 71749118655 scopus 로고    scopus 로고
    • OASIS: XACML, http://www.oasis-open.org/committees/tc-home.php?wg-abbrev= xacml
    • OASIS: XACML, http://www.oasis-open.org/committees/tc-home.php?wg-abbrev= xacml
  • 35
    • 71749085334 scopus 로고    scopus 로고
    • Cranor, L.: Web Privacy with P3P. O'Reilly & Associates, Sebastopol (2002)
    • Cranor, L.: Web Privacy with P3P. O'Reilly & Associates, Sebastopol (2002)
  • 37
    • 84942776290 scopus 로고    scopus 로고
    • Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In: Mařík, V., Štěpánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, 2736, pp. 377-382. Springer, Heidelberg (2003)
    • Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In: Mařík, V., Štěpánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol. 2736, pp. 377-382. Springer, Heidelberg (2003)
  • 38
    • 24944506569 scopus 로고    scopus 로고
    • Pearson, S.: Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, 3477, pp. 305-320. Springer, Heidelberg (2005)
    • Pearson, S.: Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 305-320. Springer, Heidelberg (2005)
  • 39
    • 0036431099 scopus 로고    scopus 로고
    • Applying Digital Rights Management Systems to Privacy Rights Management
    • Kenny, S., Korba, L.: Applying Digital Rights Management Systems to Privacy Rights Management Computers & Security 21(7) (2002)
    • (2002) Computers & Security , vol.21 , Issue.7
    • Kenny, S.1    Korba, L.2
  • 40
    • 71749084736 scopus 로고    scopus 로고
    • Tang, Q.: On Using Encryption Techniques to Enhance Sticky Policies Enforcement. TRCTIT-08-64, Centre for Telematics and Information Technology, Uni. Twente (2008)
    • Tang, Q.: On Using Encryption Techniques to Enhance Sticky Policies Enforcement. TRCTIT-08-64, Centre for Telematics and Information Technology, Uni. Twente (2008)
  • 41
    • 34547248624 scopus 로고    scopus 로고
    • Data Collection with self-enforcing privacy
    • Alexandria, Virginia, USA. ACM, New York
    • Golle, P., McSherry, F., Mironov, I.: Data Collection with self-enforcing privacy. In: CCS 2006, Alexandria, Virginia, USA. ACM, New York (2006)
    • (2006) CCS
    • Golle, P.1    McSherry, F.2    Mironov, I.3
  • 42
    • 33745885133 scopus 로고    scopus 로고
    • Web Seals: A review of Online Privacy Programs
    • Cavoukian, A., Crompton, M.: Web Seals: A review of Online Privacy Programs. In: Privacy and Data Protection (2000), http://www.privacy.gov.au/ publications/seals.pdf
    • (2000) Privacy and Data Protection
    • Cavoukian, A.1    Crompton, M.2
  • 43
    • 37349014592 scopus 로고    scopus 로고
    • Privacy Assurance: Bridging the Gap between Preference and Practice
    • Lambrinoudakis, C, Pernul, G, Tjoa, A.M, eds, TrustBus, Springer, Heidelberg
    • Elahi, T., Pearson, S.: Privacy Assurance: Bridging the Gap between Preference and Practice. In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds.) TrustBus. LNCS, vol. 4657, pp. 65-74. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4657 , pp. 65-74
    • Elahi, T.1    Pearson, S.2
  • 44
    • 77049083421 scopus 로고    scopus 로고
    • Casassa Mont, M., Thyne, R.: A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 118-134. Springer, Heidelberg (2006)
    • Casassa Mont, M., Thyne, R.: A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 118-134. Springer, Heidelberg (2006)
  • 46
    • 71749106787 scopus 로고    scopus 로고
    • IBM: Sparcle project, http://domino.research.ibm.com/comm/research- projects.nsf/pages/sparcle.index.html
    • Sparcle project
  • 47
    • 71749095204 scopus 로고    scopus 로고
    • IBM: REALM project, http://www.zurich.ibm.com/security/publications/2006/ REALM-at-IRIS2006-20060217.pdf
    • REALM project
  • 49
    • 71749109469 scopus 로고    scopus 로고
    • OASIS: eContracts Specification v1.0 (2007), http://www.oasis-open.org/ apps/org/workgroup/legalxml-econtracts
    • OASIS: eContracts Specification v1.0 (2007), http://www.oasis-open.org/ apps/org/workgroup/legalxml-econtracts
  • 51
    • 84944030615 scopus 로고    scopus 로고
    • Pseudonymising Unix Log Files
    • Davida, G.I, Frankel, Y, Rees, O, eds, InfraSec 2002, Springer, Heidelberg
    • Flegel, U.: Pseudonymising Unix Log Files. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 162-179. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2437 , pp. 162-179
    • Flegel, U.1
  • 52
    • 84955564654 scopus 로고    scopus 로고
    • A Privacy-Enhancing e-Business Model Based on Infomediaries
    • Gorodetski, V.I, Skormin, V.A, Popyack, L.J, eds, MMM-ACNS 2001, Springer, Heidelberg
    • Gritzalis, D., Moulinos, K., Kostis, K.: A Privacy-Enhancing e-Business Model Based on Infomediaries. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 72-83. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2052 , pp. 72-83
    • Gritzalis, D.1    Moulinos, K.2    Kostis, K.3
  • 53
    • 71749088022 scopus 로고    scopus 로고
    • A Privacy Management Tool for Global Outsourcing
    • Pearson, S., Sander, T., Sharma, R.: A Privacy Management Tool for Global Outsourcing. In: DPM 2009 (2009)
    • (2009) DPM
    • Pearson, S.1    Sander, T.2    Sharma, R.3
  • 55
    • 71749106786 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group (2009), https://www.trustedcomputinggroup.org
    • (2009)
  • 56
    • 33845532776 scopus 로고    scopus 로고
    • A System for Privacy-aware Resource Allocation and Data Processing in Dynamic Environments
    • Springer, Heidelberg
    • Pearson, S., Casassa Mont, M.: A System for Privacy-aware Resource Allocation and Data Processing in Dynamic Environments. In: I-NetSec 2006, vol. 201, pp. 471-482. Springer, Heidelberg (2006)
    • (2006) I-NetSec , vol.201 , pp. 471-482
    • Pearson, S.1    Casassa Mont, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.