메뉴 건너뛰기




Volumn , Issue , 2009, Pages

A client-based privacy manager for cloud computing

Author keywords

Cloud computing; Privacy

Indexed keywords

CLOUD COMPUTING; DATA LEAKAGE; PROOF OF CONCEPT; SENSITIVE DATAS; SENSITIVE INFORMATIONS;

EID: 72249098337     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1621890.1621897     Document Type: Conference Paper
Times cited : (114)

References (22)
  • 1
    • 72249118638 scopus 로고    scopus 로고
    • Amazon Web Services LLC. 2009. Case Studies: TC3 Health. Web page, http://aws.amazon.com/solutions/casestudies/ tc3-health/
    • Amazon Web Services LLC. 2009. Case Studies: TC3 Health. Web page, http://aws.amazon.com/solutions/casestudies/ tc3-health/
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Boneh, D. and Franklin, M. 2001. Identity-based Encryption from the Weil Pairing. In Advantages in Cryptology - CRYPTO 2001, G. Goos, J. Hartmanis and J. van Leeuwen, Eds. Springer LNCS Series 2139. Springer, Berlin / Heidelberg, 213-229. DOI= http://dx.doi.org/10.1007/3-540-44647-8-13
    • Boneh, D. and Franklin, M. 2001. Identity-based Encryption from the Weil Pairing. In Advantages in Cryptology - CRYPTO 2001, G. Goos, J. Hartmanis and J. van Leeuwen, Eds. Springer LNCS Series 2139. Springer, Berlin / Heidelberg, 213-229. DOI= http://dx.doi.org/10.1007/3-540-44647-8-13
  • 3
    • 84942776290 scopus 로고    scopus 로고
    • Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In Proceedings of the IEEE Workshop on Data and Expert Systems Applications (Prague, Czech Republic, September 1 - 5, 2003). DEXA'03
    • Casassa Mont, M., Pearson, S. and Bramhall, P. 2003. Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In Proceedings of the IEEE Workshop on Data and Expert Systems Applications (Prague, Czech Republic, September 1 - 5, 2003). DEXA'03. IEEE Computer Society, Washington DC, USA, 377-382.. DOI= http://dx.doi.org/10.1109/ DEXA.2003.1232051
    • (2003) IEEE Computer Society, Washington DC, USA, 377-382.. DOI
    • Casassa Mont, M.1    Pearson, S.2    Bramhall, P.3
  • 4
    • 77049083421 scopus 로고    scopus 로고
    • Casassa Mont, M. and Thyne, R. 2006. A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. In Proceedings of the 6th Workshop on Privacy Enhancing Technologies (Cambridge, UK, June 28 - 30, 2006). PET'06. Springer LNCS series 4258, Springer Berlin/ Heidelberg, 118-134. DOI= http://dx.doi.org/10.1007/11957454-7
    • Casassa Mont, M. and Thyne, R. 2006. A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. In Proceedings of the 6th Workshop on Privacy Enhancing Technologies (Cambridge, UK, June 28 - 30, 2006). PET'06. Springer LNCS series 4258, Springer Berlin/ Heidelberg, 118-134. DOI= http://dx.doi.org/10.1007/11957454-7
  • 5
    • 70349836761 scopus 로고    scopus 로고
    • Project web site
    • EnCoRe. EnCoRe: Ensuring Consent and Revocation. Project web site. http://www.encore-project.info
    • Ensuring Consent and Revocation
  • 6
    • 72249096683 scopus 로고    scopus 로고
    • Fischer-Hbner, S. 2001. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. Springer LNCS series 1958, Springer Berlin / Heidelberg. DOI= http://dx.doi.org/10.1007/3-540-45150-1
    • Fischer-Hbner, S. 2001. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. Springer LNCS series 1958, Springer Berlin / Heidelberg. DOI= http://dx.doi.org/10.1007/3-540-45150-1
  • 9
    • 72249108766 scopus 로고    scopus 로고
    • Information Commissioner's Office, UK, 2007. Privacy enhancing techologies (PETs). Data protection guidance note (29 March 2007).
    • Information Commissioner's Office, UK, 2007. Privacy enhancing techologies (PETs). Data protection guidance note (29 March 2007).
  • 10
    • 33746437508 scopus 로고    scopus 로고
    • Privacy Preserving Data Mining
    • DOI= http://dx.doi.org/10.1007/s00145-001- 0019-2
    • Lindell, Y. and Pinkas, B. 2008. Privacy Preserving Data Mining. J. Cryptology 15 (3) (2002), 151-222. DOI= http://dx.doi.org/10.1007/s00145-001- 0019-2
    • (2002) J. Cryptology , vol.15 , Issue.3 , pp. 151-222
    • Lindell, Y.1    Pinkas, B.2
  • 12
    • 72249093749 scopus 로고    scopus 로고
    • More Cloud Computing
    • 26 Sept 2008
    • Mather, T. 2008. More Cloud Computing. RSA Conference 365 blog (26 Sept 2008). https://365.rsaconference.com/blogs/tim-mather/2008/09/26/more-cloud- computing
    • (2008) RSA Conference 365 blog
    • Mather, T.1
  • 14
    • 35248872156 scopus 로고    scopus 로고
    • From Privacy Legislation to Interface Design: Implementing Information Privacy. In Human-Computer Interactions, R
    • Dingledine ed, PET 2003, Springer-Verlag Berlin, pp
    • Patrick, A. and Kenny, S. 2003. From Privacy Legislation to Interface Design: Implementing Information Privacy. In Human-Computer Interactions, R. Dingledine (ed.), PET 2003, LNCS 2760, Springer-Verlag Berlin, pp. 107-124.
    • (2003) LNCS , vol.2760 , pp. 107-124
    • Patrick, A.1    Kenny, S.2
  • 16
    • 72249090408 scopus 로고    scopus 로고
    • RSA Security, Suite. Web
    • RSA Security. 2008. Data Loss Prevention (DLP) Suite. Web page. http://www.rsa.com/node.aspx?id=3426
    • (2008) Data Loss Prevention (DLP)
  • 17
    • 72249085141 scopus 로고    scopus 로고
    • Salesforce.com, Inc. 2000-2009. Sales Force Automation. Web page. http://www.salesforce.com/products/sales-forceautomation/
    • Salesforce.com, Inc. 2000-2009. Sales Force Automation. Web page. http://www.salesforce.com/products/sales-forceautomation/
  • 18
    • 72249122966 scopus 로고    scopus 로고
    • Clouded in uncertainty - the legal pitfalls of cloud computing
    • 24 Sept 2008
    • Salmon, J. 2008. Clouded in uncertainty - the legal pitfalls of cloud computing. Computing magazine (24 Sept 2008). http://www.computing.co.uk/ computing/features/2226701/cl ouded-uncertainty-4229153
    • (2008) Computing magazine
    • Salmon, J.1
  • 19
    • 72249098988 scopus 로고    scopus 로고
    • Sobirey, M., Fischer-Hbner, S. and Rannenberg, K. 1997. Pseudonymous Audit for Privacy Enhanced Intrusion Detection. Elsevier Computers and Security 16 (3),p. 207. DOI= http://dx.doi.org/10.1016/S0167-4048(97)84519-1
    • Sobirey, M., Fischer-Hbner, S. and Rannenberg, K. 1997. Pseudonymous Audit for Privacy Enhanced Intrusion Detection. Elsevier Computers and Security 16 (3),p. 207. DOI= http://dx.doi.org/10.1016/S0167-4048(97)84519-1
  • 20
    • 72249108962 scopus 로고    scopus 로고
    • Voltage Security, 2009. Format-Preserving Encryption. Web page. http://www.voltage.com/technology/Technology-FormatPres ervingEncryption.htm
    • Voltage Security, 2009. Format-Preserving Encryption. Web page. http://www.voltage.com/technology/Technology-FormatPres ervingEncryption.htm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.