-
2
-
-
70349836055
-
-
Pearson, S.: Taking Account of Privacy when Designing Cloud Computing Services. In: ICSE-Cloud 2009, Vancouver. IEEE, Los Alamitos (2009); HP Labs Technical Report, HPL-2009-54 (2009), http://www.hpl.hp.com/techreports/2009/ HPL-2009-54.html
-
Pearson, S.: Taking Account of Privacy when Designing Cloud Computing Services. In: ICSE-Cloud 2009, Vancouver. IEEE, Los Alamitos (2009); HP Labs Technical Report, HPL-2009-54 (2009), http://www.hpl.hp.com/techreports/2009/ HPL-2009-54.html
-
-
-
-
3
-
-
33644925852
-
-
University of Pennyslavania Law Review
-
Solove, D.J.: A Taxonomy of Privacy. University of Pennyslavania Law Review 154(3), 477 (2006), http://papers.ssrn.com/sol3/papers.cfm?abstract-id= 667622
-
(2006)
A Taxonomy of Privacy
, vol.154
, Issue.3
, pp. 477
-
-
Solove, D.J.1
-
4
-
-
71849084859
-
-
Council Directive 95/46/EC. On the protection of individuals with regard to the processing of personal data and on the free movement of such data. OJ, L281, pp. 31-50 (1995)
-
Council Directive 95/46/EC. On the protection of individuals with regard to the processing of personal data and on the free movement of such data. OJ, L281, pp. 31-50 (1995)
-
-
-
-
5
-
-
71849088291
-
-
Wikipedia (2009), http://en.wikipedia.org/wiki/Capability-Maturity-Model
-
(2009)
-
-
-
6
-
-
71849085656
-
-
Smith, R.: Cloud Maturity Models Don't Make Sense (2008), http://www.informationweek.com/blog/main/archives/2008/12/cloud-maturity. html;jsessionid=OL1NSZLUOGDMCQSNDLPCKHSCJUNN2JVN
-
(2008)
Cloud Maturity Models Don't Make Sense
-
-
Smith, R.1
-
10
-
-
71849099795
-
-
OpenGroup: A Maturity Model for SOA (2009), http://www.opengroup.org/ projects/soa-book/page.tpl?CALLER=faq.tpl&ggid=1319
-
(2009)
Maturity Model for SOA
-
-
-
11
-
-
71849106611
-
Privacy Guidelines for Developing Software Products and Services, Version 2.1a
-
Microsoft Corporation: Privacy Guidelines for Developing Software Products and Services, Version 2.1a (2007), http://www.microsoft.com/Downloads/ details.aspx?FamilyID=c48cf80f-6e87-48f5-83eca18d1ad2fc1f&displaylang=en
-
-
-
-
13
-
-
35248872156
-
-
Patrick, A., Kenny, S.: From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions. In: Dingledine, R. (ed.) PET 2003. LNCS, 2760, pp. 107-124. Springer, Heidelberg (2003)
-
Patrick, A., Kenny, S.: From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 107-124. Springer, Heidelberg (2003)
-
-
-
-
15
-
-
70349797065
-
-
Information Commissioner's Office: PIA handbook (2007), http://www.ico.gov.uk/
-
(2007)
PIA handbook
-
-
-
16
-
-
70349836760
-
-
Office of the Privacy Commissioner of Canada
-
Office of the Privacy Commissioner of Canada: Fact sheet: Privacy impact assessments (2007), http://www.privcom.gc.ca/
-
(2007)
Fact sheet: Privacy impact assessments
-
-
-
17
-
-
71849111585
-
-
Information Commissioners Office: Privacy by Design. Report (2008), http://www.ico.gov.uk
-
Information Commissioners Office: Privacy by Design. Report (2008), http://www.ico.gov.uk
-
-
-
-
18
-
-
17444423290
-
Sociotechnical architecture for online privacy
-
Jutla, D.N., Bodorik, P.: Sociotechnical architecture for online privacy. IEEE Security and Privacy 3(2), 29-39 (2005)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
, pp. 29-39
-
-
Jutla, D.N.1
Bodorik, P.2
-
20
-
-
0003752204
-
-
Oxford University Press, Oxford
-
Alexander, C., Ishikawa, S., Silverstein, M., Jacobson, M., Fiksdahl-King, I., Angel, S.: A Pattern Language: Towns, Buildings, Construction. Oxford University Press, Oxford (1977)
-
(1977)
A Pattern Language: Towns, Buildings, Construction
-
-
Alexander, C.1
Ishikawa, S.2
Silverstein, M.3
Jacobson, M.4
Fiksdahl-King, I.5
Angel, S.6
-
22
-
-
67449089020
-
A collection of privacy design patterns
-
Hafiz, M.: A collection of privacy design patterns. Pattern Languages of Programs, 1-13 (2006)
-
(2006)
Pattern Languages of Programs
, pp. 1-13
-
-
Hafiz, M.1
-
23
-
-
71749088022
-
A Privacy Management Tool for Global Outsourcing
-
DPM, Springer, Heidelberg
-
Pearson, S., Sander, T., Sharma, R.: A Privacy Management Tool for Global Outsourcing. In: DPM 2009. LNCS, vol. 5939. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5939
-
-
Pearson, S.1
Sander, T.2
Sharma, R.3
-
24
-
-
71849096245
-
-
The Institute of Internal Auditors
-
The Institute of Internal Auditors: Managing and Auditing Privacy Risks, http://www.theiia.org/download.cfm?file=33917
-
Managing and Auditing Privacy Risks
-
-
-
25
-
-
33745921913
-
Dealing with privacy obligations: Important aspects and technical approaches
-
Katsikas, S.K, López, J, Pernul, G, eds, TrustBus 2004, Springer, Heidelberg
-
Casassa Mont, M.: Dealing with privacy obligations: Important aspects and technical approaches. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 120-131. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3184
, pp. 120-131
-
-
Casassa Mont, M.1
-
26
-
-
84942776290
-
-
Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In: Mařík, V., Štěpánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, 2736, pp. 377-382. Springer, Heidelberg (2003)
-
Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In: Mařík, V., Štěpánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol. 2736, pp. 377-382. Springer, Heidelberg (2003)
-
-
-
-
27
-
-
71849097239
-
-
IBM, The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2 (2004), http://www.zurich.ibm.com/security/enterprise- privacy/epal/
-
IBM, The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2 (2004), http://www.zurich.ibm.com/security/enterprise- privacy/epal/
-
-
-
-
29
-
-
71849100559
-
-
Cranor, L.: Web Privacy with P3P. O'Reilly & Associates, Sebastopol (2002)
-
Cranor, L.: Web Privacy with P3P. O'Reilly & Associates, Sebastopol (2002)
-
-
-
-
30
-
-
0009233508
-
-
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language (2001), http://wwwdse.doc.ic.ac.uk/research/policies/ index.shtml
-
(2001)
The Ponder Policy Specification Language
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
31
-
-
71849089096
-
On Using Encryption Techniques to Enhance Sticky Policies Enforcement
-
Technical Report TR-CTIT-08-64, Centre for Telematics and Information Technology, University of Twente, Enschede
-
Tang, Q.: On Using Encryption Techniques to Enhance Sticky Policies Enforcement, Technical Report TR-CTIT-08-64, Centre for Telematics and Information Technology, University of Twente, Enschede (2008)
-
(2008)
-
-
Tang, Q.1
-
32
-
-
57049159860
-
Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data
-
Chen, L, Ryan, M.D, Wang, G, eds, ICICS 2008, Springer, Heidelberg
-
Pöhls, H.C.: Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 279-293. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5308
, pp. 279-293
-
-
Pöhls, H.C.1
-
33
-
-
38349006925
-
-
Schunter, M., Waidner, M.: Simplified privacy controls for aggregated services - suspend and resume of personal data. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776, pp. 218-232. Springer, Heidelberg (2007)
-
Schunter, M., Waidner, M.: Simplified privacy controls for aggregated services - suspend and resume of personal data. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 218-232. Springer, Heidelberg (2007)
-
-
-
-
34
-
-
0036184272
-
Protecting Free Expression Online with Freenet
-
Clarke, I., Miller, S.G.: Protecting Free Expression Online with Freenet. IEEE Computing (2002)
-
(2002)
IEEE Computing
-
-
Clarke, I.1
Miller, S.G.2
-
35
-
-
84943547553
-
Pond: The OceanStore Prototype
-
Rhea, S., Eaton, P., Geels, D., Weatherspoon, H., Zhao, B., Kubiatowicz. J.: Pond: the OceanStore Prototype. In: FAST 2003 (2003)
-
(2003)
FAST
-
-
Rhea, S.1
Eaton, P.2
Geels, D.3
Weatherspoon, H.4
Zhao, B.5
Kubiatowicz, J.6
-
37
-
-
71849113695
-
-
Yearworth, M., Monahan, B., Pym, D.: Predictive Modelling for Security Operations Economics, HPL-2006-125 (2006)
-
(2006)
Predictive Modelling for Security Operations Economics, HPL-2006-125
-
-
Yearworth, M.1
Monahan, B.2
Pym, D.3
-
39
-
-
71849109867
-
-
EU FP7 Project SLA Aware Infrastructure
-
EU FP7 Project SLA Aware Infrastructure (2009), http://sla-at-soi.eu/
-
(2009)
-
-
|