-
1
-
-
71749102938
-
-
HP cloud website, http://h71028.www7.hp.com/enterprise/us/en/ technologies/cloud-computing.html?jumpid=ex-r2858-us/en/large/tsg/go-cloud
-
HP cloud website
-
-
-
2
-
-
70349836055
-
-
Pearson, S.: Taking Account of Privacy when Designing Cloud Computing Services. In: ICSE-Cloud 2009, Vancouver. IEEE, Los Alamitos (2009); HP Labs Technical Report, HPL-2009-54 (2009), http://www.hpl.hp.com/techreports/2009/ HPL-2009-54.html
-
Pearson, S.: Taking Account of Privacy when Designing Cloud Computing Services. In: ICSE-Cloud 2009, Vancouver. IEEE, Los Alamitos (2009); HP Labs Technical Report, HPL-2009-54 (2009), http://www.hpl.hp.com/techreports/2009/ HPL-2009-54.html
-
-
-
-
4
-
-
71749113519
-
-
Council Directive 95/46/EC: On the protection of individuals with regard to the processing of personal data and on the free movement of such data. OJ, L281, pp. 31-50 (1995)
-
Council Directive 95/46/EC: On the protection of individuals with regard to the processing of personal data and on the free movement of such data. OJ, L281, pp. 31-50 (1995)
-
-
-
-
5
-
-
0035570270
-
Privacy in Context
-
Ackerman, M., Darrell, T., Weitzner, D.: Privacy in Context. Human Computer Interaction 16(2), 167-176 (2001)
-
(2001)
Human Computer Interaction
, vol.16
, Issue.2
, pp. 167-176
-
-
Ackerman, M.1
Darrell, T.2
Weitzner, D.3
-
7
-
-
71749093388
-
-
Gellman, R.: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing. World Privacy Forum (2009), http://www.worldprivacyforum. org/pdf/WPF-Cloud-Privacy-Report.pdf
-
Gellman, R.: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing. World Privacy Forum (2009), http://www.worldprivacyforum. org/pdf/WPF-Cloud-Privacy-Report.pdf
-
-
-
-
10
-
-
71749114467
-
The Fog over the Grimpen Mire: Cloud Computing and the Law
-
Technology and Society , April
-
Mowbray, M.: The Fog over the Grimpen Mire: Cloud Computing and the Law. Script-ed Journal of Law, Technology and Society 6(1) (April 2009)
-
(2009)
Script-ed Journal of Law
, vol.6
, Issue.1
-
-
Mowbray, M.1
-
11
-
-
34147168694
-
The Sarbanes-Oxley Act: Implications for large-scale IT outsourcing
-
Hall, J.A., Liedtka, S.L.: The Sarbanes-Oxley Act: implications for large-scale IT outsourcing. Communications of the ACM 50(3), 95-100 (2007)
-
(2007)
Communications of the ACM
, vol.50
, Issue.3
, pp. 95-100
-
-
Hall, J.A.1
Liedtka, S.L.2
-
12
-
-
36349030850
-
Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services
-
IEEE, Los Alamitos
-
McKinley, P.K., Samimi, F.A., Shapiro, J.K., Chiping, T.: Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services. In: Dependable, Autonomic and Secure Computing, pp. 341-348. IEEE, Los Alamitos (2006)
-
(2006)
Dependable, Autonomic and Secure Computing
, pp. 341-348
-
-
McKinley, P.K.1
Samimi, F.A.2
Shapiro, J.K.3
Chiping, T.4
-
14
-
-
71749083235
-
-
Information Commissioners Office: Privacy by Design, Report (2008), http://www.ico.gov.uk
-
Information Commissioners Office: Privacy by Design, Report (2008), http://www.ico.gov.uk
-
-
-
-
16
-
-
1842538795
-
Privacy as Contextual Integrity
-
Nissenbaum, H.: Privacy as Contextual Integrity. Washington Law Review 79(1), 119-158 (2004)
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 119-158
-
-
Nissenbaum, H.1
-
17
-
-
71749091719
-
-
6, P.: Who wants privacy protection, and what do they want? Journal of Consumer Behaviour 2(1), 80-100 (2002)
-
6, P.: Who wants privacy protection, and what do they want? Journal of Consumer Behaviour 2(1), 80-100 (2002)
-
-
-
-
18
-
-
33745005053
-
An audit logic for accountability
-
IEEE, Los Alamitos
-
Cederquist, J.G., Conn, R., Dekker, M.A.C., Etalle, S., den Hartog, J.I.: An audit logic for accountability. In: Policies for Distributed Systems and Networks, pp. 34-43. IEEE, Los Alamitos (2005)
-
(2005)
Policies for Distributed Systems and Networks
, pp. 34-43
-
-
Cederquist, J.G.1
Conn, R.2
Dekker, M.A.C.3
Etalle, S.4
den Hartog, J.I.5
-
19
-
-
71749111193
-
-
UK Information Commissioner's Office A Report on the Surveillance Society
-
UK Information Commissioner's Office A Report on the Surveillance Society (2006)
-
(2006)
-
-
-
21
-
-
0041656265
-
-
Charlesworth, A.: Information Privacy Law in the European Union: E. Pluribus Unum. or Ex. Uno. Plures. Hastings Law Review 54, 931-969 (2003)
-
Charlesworth, A.: Information Privacy Law in the European Union: E. Pluribus Unum. or Ex. Uno. Plures. Hastings Law Review 54, 931-969 (2003)
-
-
-
-
22
-
-
33747156412
-
Transparent Accountable Data Mining: New Strategies for Privacy Protection
-
AAAI Press, Menlo Park
-
Weitzner, D., Abelson, H., Berners-Lee, T., Hanson, C., Hendler, J.A., Kagal, L., McGuinness, D.L., Sussman, G.J., Waterman, K.K.: Transparent Accountable Data Mining: New Strategies for Privacy Protection. In: Proceedings of AAAI Spring Symposium on The Semantic Web meets eGovernment. AAAI Press, Menlo Park (2006)
-
(2006)
Proceedings of AAAI Spring Symposium on The Semantic Web meets eGovernment
-
-
Weitzner, D.1
Abelson, H.2
Berners-Lee, T.3
Hanson, C.4
Hendler, J.A.5
Kagal, L.6
McGuinness, D.L.7
Sussman, G.J.8
Waterman, K.K.9
-
24
-
-
71749108242
-
Protecting Consumer Privacy in the Company's Best Interest
-
Dolnicar, S., Jordaan, Y.: Protecting Consumer Privacy in the Company's Best Interest. Australasian Marketing Journal 14(1), 39-61 (2006)
-
(2006)
Australasian Marketing Journal
, vol.14
, Issue.1
, pp. 39-61
-
-
Dolnicar, S.1
Jordaan, Y.2
-
25
-
-
70349800005
-
Trustguide2: An exploration of privacy preferences in an online world
-
Cunningham, P, Cunningham, M, eds, IOS Press, Amsterdam
-
Tweney, A., Crane, S.: Trustguide2: An exploration of privacy preferences in an online world. In: Cunningham, P., Cunningham, M. (eds.) Expanding the Knowledge Economy. IOS Press, Amsterdam (2007)
-
(2007)
Expanding the Knowledge Economy
-
-
Tweney, A.1
Crane, S.2
-
27
-
-
71749101693
-
-
Truste: Website (2009), http://www.truste.org/
-
(2009)
Website
-
-
-
28
-
-
71749089894
-
-
SLA@SOI: Website (2009), http://sla-at-soi.eu/
-
(2009)
SLA@SOI: Website
-
-
-
30
-
-
33745921913
-
Dealing with privacy obligations: Important aspects and technical approaches
-
Katsikas, S.K, López, J, Pernul, G, eds, TrustBus 2004, Springer, Heidelberg
-
Casassa Mont, M.: Dealing with privacy obligations: Important aspects and technical approaches. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 120-131. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3184
, pp. 120-131
-
-
Casassa Mont, M.1
-
31
-
-
72249098337
-
A Client-Based Privacy Manager for Cloud Computing
-
ACM, New York
-
Mowbray, M., Pearson, S.: A Client-Based Privacy Manager for Cloud Computing. In: Proc. COMSWARE 2009. ACM, New York (2009)
-
(2009)
Proc. COMSWARE
-
-
Mowbray, M.1
Pearson, S.2
-
32
-
-
0022882770
-
How to Generate and Exchange Secrets
-
IEEE, Los Alamitos
-
Yao, A.C.: How to Generate and Exchange Secrets. In: Proc. FoCS, pp. 162-167. IEEE, Los Alamitos (1986)
-
(1986)
Proc. FoCS
, pp. 162-167
-
-
Yao, A.C.1
-
33
-
-
71749120470
-
-
IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2 (2004), http://www.zurich.ibm.com/security/enterprise- privacy/epal/
-
IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2 (2004), http://www.zurich.ibm.com/security/enterprise- privacy/epal/
-
-
-
-
34
-
-
71749118655
-
-
OASIS: XACML, http://www.oasis-open.org/committees/tc-home.php?wg-abbrev= xacml
-
OASIS: XACML, http://www.oasis-open.org/committees/tc-home.php?wg-abbrev= xacml
-
-
-
-
35
-
-
71749085334
-
-
Cranor, L.: Web Privacy with P3P. O'Reilly & Associates, Sebastopol (2002)
-
Cranor, L.: Web Privacy with P3P. O'Reilly & Associates, Sebastopol (2002)
-
-
-
-
36
-
-
0009233508
-
-
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language (2001), http://wwwdse.doc.ic.ac.uk/research/policies/ index.shtml
-
(2001)
The Ponder Policy Specification Language
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
37
-
-
84942776290
-
-
Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In: Mařík, V., Štěpánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, 2736, pp. 377-382. Springer, Heidelberg (2003)
-
Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In: Mařík, V., Štěpánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol. 2736, pp. 377-382. Springer, Heidelberg (2003)
-
-
-
-
38
-
-
24944506569
-
-
Pearson, S.: Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, 3477, pp. 305-320. Springer, Heidelberg (2005)
-
Pearson, S.: Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 305-320. Springer, Heidelberg (2005)
-
-
-
-
39
-
-
0036431099
-
Applying Digital Rights Management Systems to Privacy Rights Management
-
Kenny, S., Korba, L.: Applying Digital Rights Management Systems to Privacy Rights Management Computers & Security 21(7) (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.7
-
-
Kenny, S.1
Korba, L.2
-
40
-
-
71749084736
-
-
Tang, Q.: On Using Encryption Techniques to Enhance Sticky Policies Enforcement. TRCTIT-08-64, Centre for Telematics and Information Technology, Uni. Twente (2008)
-
Tang, Q.: On Using Encryption Techniques to Enhance Sticky Policies Enforcement. TRCTIT-08-64, Centre for Telematics and Information Technology, Uni. Twente (2008)
-
-
-
-
41
-
-
34547248624
-
Data Collection with self-enforcing privacy
-
Alexandria, Virginia, USA. ACM, New York
-
Golle, P., McSherry, F., Mironov, I.: Data Collection with self-enforcing privacy. In: CCS 2006, Alexandria, Virginia, USA. ACM, New York (2006)
-
(2006)
CCS
-
-
Golle, P.1
McSherry, F.2
Mironov, I.3
-
42
-
-
33745885133
-
Web Seals: A review of Online Privacy Programs
-
Cavoukian, A., Crompton, M.: Web Seals: A review of Online Privacy Programs. In: Privacy and Data Protection (2000), http://www.privacy.gov.au/ publications/seals.pdf
-
(2000)
Privacy and Data Protection
-
-
Cavoukian, A.1
Crompton, M.2
-
43
-
-
37349014592
-
Privacy Assurance: Bridging the Gap between Preference and Practice
-
Lambrinoudakis, C, Pernul, G, Tjoa, A.M, eds, TrustBus, Springer, Heidelberg
-
Elahi, T., Pearson, S.: Privacy Assurance: Bridging the Gap between Preference and Practice. In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds.) TrustBus. LNCS, vol. 4657, pp. 65-74. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4657
, pp. 65-74
-
-
Elahi, T.1
Pearson, S.2
-
44
-
-
77049083421
-
-
Casassa Mont, M., Thyne, R.: A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 118-134. Springer, Heidelberg (2006)
-
Casassa Mont, M., Thyne, R.: A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 118-134. Springer, Heidelberg (2006)
-
-
-
-
46
-
-
71749106787
-
-
IBM: Sparcle project, http://domino.research.ibm.com/comm/research- projects.nsf/pages/sparcle.index.html
-
Sparcle project
-
-
-
47
-
-
71749095204
-
-
IBM: REALM project, http://www.zurich.ibm.com/security/publications/2006/ REALM-at-IRIS2006-20060217.pdf
-
REALM project
-
-
-
48
-
-
40449096076
-
Analyzing Regulatory Rules for Privacy and Security Requirements
-
Travis, D., Breaux, T.D., Antón, A.I.: Analyzing Regulatory Rules for Privacy and Security Requirements. Transactions on Software Engineering 34(1), 5-20 (2008)
-
(2008)
Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 5-20
-
-
Travis, D.1
Breaux, T.D.2
Antón, A.I.3
-
49
-
-
71749109469
-
-
OASIS: eContracts Specification v1.0 (2007), http://www.oasis-open.org/ apps/org/workgroup/legalxml-econtracts
-
OASIS: eContracts Specification v1.0 (2007), http://www.oasis-open.org/ apps/org/workgroup/legalxml-econtracts
-
-
-
-
51
-
-
84944030615
-
Pseudonymising Unix Log Files
-
Davida, G.I, Frankel, Y, Rees, O, eds, InfraSec 2002, Springer, Heidelberg
-
Flegel, U.: Pseudonymising Unix Log Files. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 162-179. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2437
, pp. 162-179
-
-
Flegel, U.1
-
52
-
-
84955564654
-
A Privacy-Enhancing e-Business Model Based on Infomediaries
-
Gorodetski, V.I, Skormin, V.A, Popyack, L.J, eds, MMM-ACNS 2001, Springer, Heidelberg
-
Gritzalis, D., Moulinos, K., Kostis, K.: A Privacy-Enhancing e-Business Model Based on Infomediaries. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 72-83. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2052
, pp. 72-83
-
-
Gritzalis, D.1
Moulinos, K.2
Kostis, K.3
-
53
-
-
71749088022
-
A Privacy Management Tool for Global Outsourcing
-
Pearson, S., Sander, T., Sharma, R.: A Privacy Management Tool for Global Outsourcing. In: DPM 2009 (2009)
-
(2009)
DPM
-
-
Pearson, S.1
Sander, T.2
Sharma, R.3
-
54
-
-
84979796609
-
Privacy Impact Assessments: International experience as a basis for UK guidance
-
243, 233-242
-
Warren, A., Bayley, R., Charlesworth, A., Bennett, C., Clarke, R., Oppenheim, C.: Privacy Impact Assessments: international experience as a basis for UK guidance. Computer Law and Security Report 24(3), 233-242 (2008)
-
(2008)
Computer Law and Security Report
-
-
Warren, A.1
Bayley, R.2
Charlesworth, A.3
Bennett, C.4
Clarke, R.5
Oppenheim, C.6
-
55
-
-
71749106786
-
-
Trusted Computing Group
-
Trusted Computing Group (2009), https://www.trustedcomputinggroup.org
-
(2009)
-
-
-
56
-
-
33845532776
-
A System for Privacy-aware Resource Allocation and Data Processing in Dynamic Environments
-
Springer, Heidelberg
-
Pearson, S., Casassa Mont, M.: A System for Privacy-aware Resource Allocation and Data Processing in Dynamic Environments. In: I-NetSec 2006, vol. 201, pp. 471-482. Springer, Heidelberg (2006)
-
(2006)
I-NetSec
, vol.201
, pp. 471-482
-
-
Pearson, S.1
Casassa Mont, M.2
-
57
-
-
71749121484
-
Trusted virtual platforms: A key enabler for converged client devices
-
Dalton, C., Plaquin, D., Weidner, W., Kuhlmann, D., Balacheff, B., Brown, R.: Trusted virtual platforms: a key enabler for converged client devices. Operating Systems Review 43(1), 36-43 (2009)
-
(2009)
Operating Systems Review
, vol.43
, Issue.1
, pp. 36-43
-
-
Dalton, C.1
Plaquin, D.2
Weidner, W.3
Kuhlmann, D.4
Balacheff, B.5
Brown, R.6
|