-
1
-
-
71749101474
-
-
Regulation of Investigatory Powers Act, Part II, s 28, UK (2000)
-
Regulation of Investigatory Powers Act, Part II, s 28, UK (2000)
-
-
-
-
2
-
-
71749110030
-
-
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act, Title V, s 505 2001
-
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act, Title V, s 505 (2001)
-
-
-
-
4
-
-
71749117185
-
-
EU Data Protection Directive (95/46/EC) (1995)
-
EU Data Protection Directive (95/46/EC) (1995)
-
-
-
-
7
-
-
1142270162
-
-
Pearson, S, ed, Prentice-Hall, Englewood Cliffs
-
Pearson, S. (ed.): Trusted Computing Platforms. Prentice-Hall, Englewood Cliffs (2002)
-
(2002)
Trusted Computing Platforms
-
-
-
10
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Goos, G, Hartmanis, J, van Leeuwen, J, eds, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Goos, G., Hartmanis, J., van Leeuwen, J. (eds.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
84942776290
-
Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services
-
IEEE Computer Society Press, Washington
-
Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In: IEEE Workshop on Data and Expert Systems Applications, pp. 377-382. IEEE Computer Society Press, Washington (2003)
-
(2003)
IEEE Workshop on Data and Expert Systems Applications
, pp. 377-382
-
-
Casassa Mont, M.1
Pearson, S.2
Bramhall, P.3
-
12
-
-
77049083421
-
-
Casassa Mont, M., Thyne, R.: A systemic approach to automate privacy policy enforcement in enterprises. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 118-134. Springer, Heidelberg (2006)
-
Casassa Mont, M., Thyne, R.: A systemic approach to automate privacy policy enforcement in enterprises. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 118-134. Springer, Heidelberg (2006)
-
-
-
-
13
-
-
72249098337
-
A client-based privacy manager for cloud computing
-
ACM, New York
-
Mowbray, M., Pearson, S.: A client-based privacy manager for cloud computing. In: COMSWARE 2009. ACM, New York (2009)
-
(2009)
COMSWARE
-
-
Mowbray, M.1
Pearson, S.2
-
15
-
-
24944506569
-
-
Pearson, S.: Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, 3477, pp. 305-320. Springer, Heidelberg (2005)
-
Pearson, S.: Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 305-320. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
71749121484
-
Trusted virtual platforms: A key enabler for converged client devices
-
ACM, New York
-
Dalton, C., Plaquin, D., Weidner, W., Kuhlmann, D., Balacheff, B., Brown, R.: Trusted virtual platforms: a key enabler for converged client devices. In: ACM SIGOPS Operating Systems Review, vol. 43(1), pp. 36-43. ACM, New York (2009)
-
(2009)
ACM SIGOPS Operating Systems Review
, vol.43
, Issue.1
, pp. 36-43
-
-
Dalton, C.1
Plaquin, D.2
Weidner, W.3
Kuhlmann, D.4
Balacheff, B.5
Brown, R.6
-
17
-
-
84955564654
-
A privacy-enhancing e-business model based on infomediaries
-
Gorodetski, V.I, Skormin, V.A, Popyack, L.J, eds, MMM-ACNS 2001, Springer, Heidelberg
-
Gritzalis, D., Moulinos, K., Kostis, K.: A privacy-enhancing e-business model based on infomediaries. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 72-83. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2052
, pp. 72-83
-
-
Gritzalis, D.1
Moulinos, K.2
Kostis, K.3
-
18
-
-
84857713690
-
-
Otemba project
-
Otemba project: The Reasons for Otemba's Existence, http://sourceforge. net/apps/trac/otemba/wiki/Reasons%20for%20existence
-
The Reasons for Otemba's Existence
-
-
-
19
-
-
0022882770
-
How to Generate and Exchange Secrets
-
FoCS, pp, IEEE Press, New York
-
Yao, A.C.: How to Generate and Exchange Secrets. In: 27th Symposium of Foundations of Computer Science (FoCS), pp. 162-167. IEEE Press, New York (1986)
-
(1986)
27th Symposium of Foundations of Computer Science
, pp. 162-167
-
-
Yao, A.C.1
-
20
-
-
70350642087
-
Fully Homomorphic Encryption Using Ideal Lattices
-
Bethesda, Maryland, USA, May 31-June 2
-
Gentry, C.: Fully Homomorphic Encryption Using Ideal Lattices. In: 41st ACM Symposium on Theory of Computing, Bethesda, Maryland, USA, May 31-June 2 (2009), pp. 169-178 (2009)
-
(2009)
41st ACM Symposium on Theory of Computing
, pp. 169-178
-
-
Gentry, C.1
-
21
-
-
24144433396
-
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 325-341. Springer, Heidelberg (2005)
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
-
-
-
-
22
-
-
33746437508
-
Privacy Preserving Data Mining
-
Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. J. Cryptology 15(3), 151-222 (2002)
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 151-222
-
-
Lindell, Y.1
Pinkas, B.2
-
24
-
-
37549003336
-
Map Reduce: Simplified data processing on large clusters
-
Dean, J., Ghemawat, S.: Map Reduce: Simplified data processing on large clusters. Communications of the ACM 51(1) (2008)
-
(2008)
Communications of the ACM
, vol.51
, Issue.1
-
-
Dean, J.1
Ghemawat, S.2
-
25
-
-
0004081967
-
-
Addison-Wesley Longman Publishing Co, Boston
-
Date, C.J.: A guide to the SQL standard. Addison-Wesley Longman Publishing Co., Boston (1986)
-
(1986)
A guide to the SQL standard
-
-
Date, C.J.1
-
27
-
-
0005301490
-
On data banks and privacy homomorphisms
-
DeMillo, R.A, et al, eds, Academic Press, New York
-
Rivest, R., Adelman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: DeMillo, R.A., et al. (eds.) Foundations of Secure Computation, pp. 168-179. Academic Press, New York (1978)
-
(1978)
Foundations of Secure Computation
, pp. 168-179
-
-
Rivest, R.1
Adelman, L.2
Dertouzos, M.L.3
-
30
-
-
85001786260
-
Secure and Selective Dissemination of XML Documents
-
ACM, New York
-
Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. In: Proc. TISSEC, pp. 290-331. ACM, New York (2002)
-
(2002)
Proc. TISSEC
, pp. 290-331
-
-
Bertino, E.1
Ferrari, E.2
-
32
-
-
0242674432
-
Hippocratic databases
-
VLDB Endowment, pp
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proc. VLDB, VLDB Endowment, pp. 143-154 (2002)
-
(2002)
Proc. VLDB
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
34
-
-
26844431950
-
-
Casassa Mont, M., Pearson, S.: An Adaptive Privacy Management System for Data Repositories. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LMXS, 3592, pp. 236-245. Springer, Heidelberg (2005)
-
Casassa Mont, M., Pearson, S.: An Adaptive Privacy Management System for Data Repositories. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LMXS, vol. 3592, pp. 236-245. Springer, Heidelberg (2005)
-
-
-
-
36
-
-
71749113694
-
Risk Modeling, Assessment, and Management
-
Haimes, Y.Y.: Risk Modeling, Assessment, and Management. Systems, Man, and Cybernetics, Part C: Applications and Reviews 29(2), 315 (1999)
-
(1999)
Systems, Man, and Cybernetics, Part C: Applications and Reviews
, vol.29
, Issue.2
, pp. 315
-
-
Haimes, Y.Y.1
-
37
-
-
29244482785
-
P2P reputation management: Probabilistic estimation vs. social networks. Management in Peer-to-Peer Systems
-
Despotovic, Z., Aberer, K.: P2P reputation management: Probabilistic estimation vs. social networks. Management in Peer-to-Peer Systems, Computer Networks 50(4), 485-500 (2006)
-
(2006)
Computer Networks
, vol.50
, Issue.4
, pp. 485-500
-
-
Despotovic, Z.1
Aberer, K.2
|