-
1
-
-
77954006965
-
Privacy enforcement in e-services environments
-
In G. Yee (Ed.), Hershey, PA: Idea Group, Inc
-
Adams, C., & Barbieri, K. (2006). Privacy enforcement in e-services environments. In G. Yee (Ed.), Privacy protection for e-services. Hershey, PA: Idea Group, Inc.
-
(2006)
Privacy Protection for E-Services
-
-
Adams, C.1
Barbieri, K.2
-
2
-
-
84899354700
-
Practical threat analysis and risk management
-
Retrieved November 7, 2008, from
-
Bauer, M. (2002). Practical threat analysis and risk management. Linux Journal, 2002(93), 9. Retrieved November 7, 2008, from http://www.linuxjournal. com/article/5567
-
(2002)
Linux Journal
, vol.2002
, Issue.93
, pp. 9
-
-
Bauer, M.1
-
3
-
-
84945975009
-
-
(n.d.). Retrieved November 9, from
-
Carnegie Mellon Software Engineering Institute. (n.d.). Welcome to the CMMI Website. Retrieved November 9, 2006, from http://www.sei.cmu.edu/cmmi/cmmi.html
-
(2006)
Welcome to the CMMI Website
-
-
-
4
-
-
77956858868
-
-
Retrieved May 6, , from
-
Enright, K. P. (n.d.). Privacy audit checklist. Retrieved May 6, 2006, from http://cyber.law.harvard. edu/clinical/privacyaudit.html
-
(2006)
Privacy Audit Checklist
-
-
Enright, K.P.1
-
6
-
-
24944578141
-
-
IBM , June 12). (EPAL 1. 1). Retrieved June 2, 2007
-
IBM. (2003, June 12). The enterprise privacy authorization language (EPAL 1.1). Retrieved June 2, 2007, http://www.zurich.ibm.com/security/enterprise- privacy/epal/
-
(2003)
The Enterprise Privacy Authorization Language
-
-
-
7
-
-
84899201651
-
-
(n.d.). Retrieved January 28, 2006, from
-
International Organization for Standardization. (n.d.). Selection and use of the ISO 9000:2000 family of standards. Retrieved January 28, 2006, from http://www.iso.org/iso/en/iso9000-14000/understand/selection-use/selection-use.html
-
Selection and Use of the ISO 9000: 2000 Family of Standards
-
-
-
8
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
Edmonton, Alberta
-
Iyengar, V. S. (2002). Transforming data to satisfy privacy constraints. In Proceedings of the SIGKDD'02, Edmonton, Alberta (pp. 279-288).
-
(2002)
Proceedings of the SIGKDD'02
, pp. 279-288
-
-
Iyengar, V.S.1
-
9
-
-
34250771078
-
Privacy and security threat analysis of the federal employee personal identity verification (PIV) program
-
July). Pittsburgh, Pennsylvania
-
Karger, P. A. (2006, July). Privacy and security threat analysis of the federal employee personal identity verification (PIV) program. In Proceedings of the Second Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania (pp. 114-121).
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 114-121
-
-
Karger, P.A.1
-
10
-
-
0036431099
-
Adapting digital rights management to privacy rights management
-
November
-
Kenny, S., & Korba, L. (2002, November). Adapting digital rights management to privacy rights management. Computers & Security, 21(7), 648-664.
-
(2002)
Computers & Security
, vol.21
, Issue.7
, pp. 648-664
-
-
Kenny, S.1
Korba, L.2
-
11
-
-
85016682337
-
Privacy through pseudonymity in user-adaptive systems
-
May
-
Kobsa, A., & Schreck, J. (2003, May). Privacy through pseudonymity in user-adaptive systems. ACM Transactions in Internet Technology, 3(2), 149-183.
-
(2003)
ACM Transactions in Internet Technology
, vol.3
, Issue.2
, pp. 149-183
-
-
Kobsa, A.1
Schreck, J.2
-
13
-
-
2642549597
-
-
McGraw-Hill/Osborne
-
O'Neill, M., Hallam-Baker, P., MacCann, S., Shema, M., Simon, E., Watters, P. A., et al. (2003). Web services security. McGraw-Hill/Osborne.
-
(2003)
Web Services Security.
-
-
O'Neill, M.1
Hallam-Baker, P.2
MacCann, S.3
Shema, M.4
Simon, E.5
Watters, P.A.6
-
15
-
-
85020200328
-
Towards a secure system engineering methodology
-
September
-
Salter, C., Saydjari, O. S., Schneier, B., & Wallner, J. (1998, September). Towards a secure system engineering methodology. In Proceedings of New Security Paradigms Workshop (pp. 2-10).
-
(1998)
Proceedings of New Security Paradigms Workshop
, pp. 2-10
-
-
Salter, C.1
Saydjari, O.S.2
Schneier, B.3
Wallner, J.4
-
16
-
-
51149108759
-
Pseudonym technology for e-services
-
In G. Yee (Ed.), Hershey, PA: Idea Group, Inc
-
Song, R., Korba, L., & Yee, G. (2006). Pseudonym technology for e-services. In G. Yee (Ed.), Privacy protection for e-services. Hershey, PA: Idea Group, Inc.
-
(2006)
Privacy Protection for E-Services
-
-
Song, R.1
Korba, L.2
Yee, G.3
-
20
-
-
0345673940
-
-
W3C. ( April 15). (W3C Working Draft). Retrieved November 9, 2006, from
-
W3C. (2002, April 15). A P3P preference exchange language 1.0 (APPEL1.0) (W3C Working Draft). Retrieved November 9, 2006, from http://www. w3.org/TR/P3P-preferences/
-
(2002)
A P3P Preference Exchange Language 1.0 (APPEL1. 0)
-
-
-
22
-
-
3042575530
-
The negotiation of privacy policies in distance education
-
May 18-21). Paper presented at the Philadelphia
-
Yee, G., & Korba, L. (2003a, May 18-21). The negotiation of privacy policies in distance education. Paper presented at the 14th IRMA International Conference, Philadelphia.
-
(2003)
14th IRMA International Conference
-
-
Yee, G.1
Korba, L.2
-
23
-
-
78649832628
-
Bilateral e-services negotiation under uncertainty
-
January 27-31 Orlando, Florida
-
Yee, G., & Korba, L. (2003b, January 27-31). Bilateral e-services negotiation under uncertainty. In Proceedings of the 2003 International Symposium on Applications and the Internet (SAINT2003), Orlando, Florida (pp. 352-355).
-
(2003)
Proceedings of the 2003 International Symposium on Applications and the Internet (SAINT2003)
, pp. 352-355
-
-
Yee, G.1
Korba, L.2
-
25
-
-
85001837279
-
Semi-automatic derivation and use of personal privacy policies in e-business
-
IGI Global, Inc
-
Yee, G., & Korba, L. (2005). Semi-automatic derivation and use of personal privacy policies in e-business. International Journal of E-Business Research, 1(1), 54-69. IGI Global, Inc.
-
(2005)
International Journal of E-Business Research
, vol.1
, Issue.1
, pp. 54-69
-
-
Yee, G.1
Korba, L.2
|