-
1
-
-
72249118638
-
-
Amazon Web Services LLC. 2009. Case Studies: TC3 Health. Web page, http://aws.amazon.com/solutions/casestudies/ tc3-health/
-
Amazon Web Services LLC. 2009. Case Studies: TC3 Health. Web page, http://aws.amazon.com/solutions/casestudies/ tc3-health/
-
-
-
-
2
-
-
84874324906
-
-
Boneh, D. and Franklin, M. 2001. Identity-based Encryption from the Weil Pairing. In Advantages in Cryptology - CRYPTO 2001, G. Goos, J. Hartmanis and J. van Leeuwen, Eds. Springer LNCS Series 2139. Springer, Berlin / Heidelberg, 213-229. DOI= http://dx.doi.org/10.1007/3-540-44647-8-13
-
Boneh, D. and Franklin, M. 2001. Identity-based Encryption from the Weil Pairing. In Advantages in Cryptology - CRYPTO 2001, G. Goos, J. Hartmanis and J. van Leeuwen, Eds. Springer LNCS Series 2139. Springer, Berlin / Heidelberg, 213-229. DOI= http://dx.doi.org/10.1007/3-540-44647-8-13
-
-
-
-
3
-
-
84942776290
-
Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In Proceedings of the IEEE Workshop on Data and Expert Systems Applications (Prague, Czech Republic, September 1 - 5, 2003). DEXA'03
-
Casassa Mont, M., Pearson, S. and Bramhall, P. 2003. Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In Proceedings of the IEEE Workshop on Data and Expert Systems Applications (Prague, Czech Republic, September 1 - 5, 2003). DEXA'03. IEEE Computer Society, Washington DC, USA, 377-382.. DOI= http://dx.doi.org/10.1109/ DEXA.2003.1232051
-
(2003)
IEEE Computer Society, Washington DC, USA, 377-382.. DOI
-
-
Casassa Mont, M.1
Pearson, S.2
Bramhall, P.3
-
4
-
-
77049083421
-
-
Casassa Mont, M. and Thyne, R. 2006. A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. In Proceedings of the 6th Workshop on Privacy Enhancing Technologies (Cambridge, UK, June 28 - 30, 2006). PET'06. Springer LNCS series 4258, Springer Berlin/ Heidelberg, 118-134. DOI= http://dx.doi.org/10.1007/11957454-7
-
Casassa Mont, M. and Thyne, R. 2006. A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. In Proceedings of the 6th Workshop on Privacy Enhancing Technologies (Cambridge, UK, June 28 - 30, 2006). PET'06. Springer LNCS series 4258, Springer Berlin/ Heidelberg, 118-134. DOI= http://dx.doi.org/10.1007/11957454-7
-
-
-
-
5
-
-
70349836761
-
-
Project web site
-
EnCoRe. EnCoRe: Ensuring Consent and Revocation. Project web site. http://www.encore-project.info
-
Ensuring Consent and Revocation
-
-
-
6
-
-
72249096683
-
-
Fischer-Hbner, S. 2001. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. Springer LNCS series 1958, Springer Berlin / Heidelberg. DOI= http://dx.doi.org/10.1007/3-540-45150-1
-
Fischer-Hbner, S. 2001. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. Springer LNCS series 1958, Springer Berlin / Heidelberg. DOI= http://dx.doi.org/10.1007/3-540-45150-1
-
-
-
-
9
-
-
72249108766
-
-
Information Commissioner's Office, UK, 2007. Privacy enhancing techologies (PETs). Data protection guidance note (29 March 2007).
-
Information Commissioner's Office, UK, 2007. Privacy enhancing techologies (PETs). Data protection guidance note (29 March 2007).
-
-
-
-
10
-
-
33746437508
-
Privacy Preserving Data Mining
-
DOI= http://dx.doi.org/10.1007/s00145-001- 0019-2
-
Lindell, Y. and Pinkas, B. 2008. Privacy Preserving Data Mining. J. Cryptology 15 (3) (2002), 151-222. DOI= http://dx.doi.org/10.1007/s00145-001- 0019-2
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 151-222
-
-
Lindell, Y.1
Pinkas, B.2
-
12
-
-
72249093749
-
More Cloud Computing
-
26 Sept 2008
-
Mather, T. 2008. More Cloud Computing. RSA Conference 365 blog (26 Sept 2008). https://365.rsaconference.com/blogs/tim-mather/2008/09/26/more-cloud- computing
-
(2008)
RSA Conference 365 blog
-
-
Mather, T.1
-
14
-
-
35248872156
-
From Privacy Legislation to Interface Design: Implementing Information Privacy. In Human-Computer Interactions, R
-
Dingledine ed, PET 2003, Springer-Verlag Berlin, pp
-
Patrick, A. and Kenny, S. 2003. From Privacy Legislation to Interface Design: Implementing Information Privacy. In Human-Computer Interactions, R. Dingledine (ed.), PET 2003, LNCS 2760, Springer-Verlag Berlin, pp. 107-124.
-
(2003)
LNCS
, vol.2760
, pp. 107-124
-
-
Patrick, A.1
Kenny, S.2
-
16
-
-
72249090408
-
-
RSA Security, Suite. Web
-
RSA Security. 2008. Data Loss Prevention (DLP) Suite. Web page. http://www.rsa.com/node.aspx?id=3426
-
(2008)
Data Loss Prevention (DLP)
-
-
-
17
-
-
72249085141
-
-
Salesforce.com, Inc. 2000-2009. Sales Force Automation. Web page. http://www.salesforce.com/products/sales-forceautomation/
-
Salesforce.com, Inc. 2000-2009. Sales Force Automation. Web page. http://www.salesforce.com/products/sales-forceautomation/
-
-
-
-
18
-
-
72249122966
-
Clouded in uncertainty - the legal pitfalls of cloud computing
-
24 Sept 2008
-
Salmon, J. 2008. Clouded in uncertainty - the legal pitfalls of cloud computing. Computing magazine (24 Sept 2008). http://www.computing.co.uk/ computing/features/2226701/cl ouded-uncertainty-4229153
-
(2008)
Computing magazine
-
-
Salmon, J.1
-
19
-
-
72249098988
-
-
Sobirey, M., Fischer-Hbner, S. and Rannenberg, K. 1997. Pseudonymous Audit for Privacy Enhanced Intrusion Detection. Elsevier Computers and Security 16 (3),p. 207. DOI= http://dx.doi.org/10.1016/S0167-4048(97)84519-1
-
Sobirey, M., Fischer-Hbner, S. and Rannenberg, K. 1997. Pseudonymous Audit for Privacy Enhanced Intrusion Detection. Elsevier Computers and Security 16 (3),p. 207. DOI= http://dx.doi.org/10.1016/S0167-4048(97)84519-1
-
-
-
-
20
-
-
72249108962
-
-
Voltage Security, 2009. Format-Preserving Encryption. Web page. http://www.voltage.com/technology/Technology-FormatPres ervingEncryption.htm
-
Voltage Security, 2009. Format-Preserving Encryption. Web page. http://www.voltage.com/technology/Technology-FormatPres ervingEncryption.htm
-
-
-
|