메뉴 건너뛰기




Volumn 6, Issue 2, 2009, Pages 20-41

Estimating the privacy protection capability of a web service provider

Author keywords

Estimates; Internet service; Privacy; Privacy protection capability; Web service

Indexed keywords

DATA PRIVACY; INTERNET SERVICE PROVIDERS; WEBSITES;

EID: 77950336442     PISSN: 15457362     EISSN: 15465004     Source Type: Journal    
DOI: 10.4018/jwsr.2009092202     Document Type: Article
Times cited : (6)

References (25)
  • 1
    • 77954006965 scopus 로고    scopus 로고
    • Privacy enforcement in e-services environments
    • In G. Yee (Ed.), Hershey, PA: Idea Group, Inc
    • Adams, C., & Barbieri, K. (2006). Privacy enforcement in e-services environments. In G. Yee (Ed.), Privacy protection for e-services. Hershey, PA: Idea Group, Inc.
    • (2006) Privacy Protection for E-Services
    • Adams, C.1    Barbieri, K.2
  • 2
    • 84899354700 scopus 로고    scopus 로고
    • Practical threat analysis and risk management
    • Retrieved November 7, 2008, from
    • Bauer, M. (2002). Practical threat analysis and risk management. Linux Journal, 2002(93), 9. Retrieved November 7, 2008, from http://www.linuxjournal. com/article/5567
    • (2002) Linux Journal , vol.2002 , Issue.93 , pp. 9
    • Bauer, M.1
  • 3
    • 84945975009 scopus 로고    scopus 로고
    • (n.d.). Retrieved November 9, from
    • Carnegie Mellon Software Engineering Institute. (n.d.). Welcome to the CMMI Website. Retrieved November 9, 2006, from http://www.sei.cmu.edu/cmmi/cmmi.html
    • (2006) Welcome to the CMMI Website
  • 4
    • 77956858868 scopus 로고    scopus 로고
    • Retrieved May 6, , from
    • Enright, K. P. (n.d.). Privacy audit checklist. Retrieved May 6, 2006, from http://cyber.law.harvard. edu/clinical/privacyaudit.html
    • (2006) Privacy Audit Checklist
    • Enright, K.P.1
  • 6
    • 24944578141 scopus 로고    scopus 로고
    • IBM , June 12). (EPAL 1. 1). Retrieved June 2, 2007
    • IBM. (2003, June 12). The enterprise privacy authorization language (EPAL 1.1). Retrieved June 2, 2007, http://www.zurich.ibm.com/security/enterprise- privacy/epal/
    • (2003) The Enterprise Privacy Authorization Language
  • 7
    • 84899201651 scopus 로고    scopus 로고
    • (n.d.). Retrieved January 28, 2006, from
    • International Organization for Standardization. (n.d.). Selection and use of the ISO 9000:2000 family of standards. Retrieved January 28, 2006, from http://www.iso.org/iso/en/iso9000-14000/understand/selection-use/selection-use.html
    • Selection and Use of the ISO 9000: 2000 Family of Standards
  • 8
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • Edmonton, Alberta
    • Iyengar, V. S. (2002). Transforming data to satisfy privacy constraints. In Proceedings of the SIGKDD'02, Edmonton, Alberta (pp. 279-288).
    • (2002) Proceedings of the SIGKDD'02 , pp. 279-288
    • Iyengar, V.S.1
  • 9
    • 34250771078 scopus 로고    scopus 로고
    • Privacy and security threat analysis of the federal employee personal identity verification (PIV) program
    • July). Pittsburgh, Pennsylvania
    • Karger, P. A. (2006, July). Privacy and security threat analysis of the federal employee personal identity verification (PIV) program. In Proceedings of the Second Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania (pp. 114-121).
    • (2006) Proceedings of the Second Symposium on Usable Privacy and Security , pp. 114-121
    • Karger, P.A.1
  • 10
    • 0036431099 scopus 로고    scopus 로고
    • Adapting digital rights management to privacy rights management
    • November
    • Kenny, S., & Korba, L. (2002, November). Adapting digital rights management to privacy rights management. Computers & Security, 21(7), 648-664.
    • (2002) Computers & Security , vol.21 , Issue.7 , pp. 648-664
    • Kenny, S.1    Korba, L.2
  • 11
    • 85016682337 scopus 로고    scopus 로고
    • Privacy through pseudonymity in user-adaptive systems
    • May
    • Kobsa, A., & Schreck, J. (2003, May). Privacy through pseudonymity in user-adaptive systems. ACM Transactions in Internet Technology, 3(2), 149-183.
    • (2003) ACM Transactions in Internet Technology , vol.3 , Issue.2 , pp. 149-183
    • Kobsa, A.1    Schreck, J.2
  • 16
    • 51149108759 scopus 로고    scopus 로고
    • Pseudonym technology for e-services
    • In G. Yee (Ed.), Hershey, PA: Idea Group, Inc
    • Song, R., Korba, L., & Yee, G. (2006). Pseudonym technology for e-services. In G. Yee (Ed.), Privacy protection for e-services. Hershey, PA: Idea Group, Inc.
    • (2006) Privacy Protection for E-Services
    • Song, R.1    Korba, L.2    Yee, G.3
  • 20
    • 0345673940 scopus 로고    scopus 로고
    • W3C. ( April 15). (W3C Working Draft). Retrieved November 9, 2006, from
    • W3C. (2002, April 15). A P3P preference exchange language 1.0 (APPEL1.0) (W3C Working Draft). Retrieved November 9, 2006, from http://www. w3.org/TR/P3P-preferences/
    • (2002) A P3P Preference Exchange Language 1.0 (APPEL1. 0)
  • 22
    • 3042575530 scopus 로고    scopus 로고
    • The negotiation of privacy policies in distance education
    • May 18-21). Paper presented at the Philadelphia
    • Yee, G., & Korba, L. (2003a, May 18-21). The negotiation of privacy policies in distance education. Paper presented at the 14th IRMA International Conference, Philadelphia.
    • (2003) 14th IRMA International Conference
    • Yee, G.1    Korba, L.2
  • 25
    • 85001837279 scopus 로고    scopus 로고
    • Semi-automatic derivation and use of personal privacy policies in e-business
    • IGI Global, Inc
    • Yee, G., & Korba, L. (2005). Semi-automatic derivation and use of personal privacy policies in e-business. International Journal of E-Business Research, 1(1), 54-69. IGI Global, Inc.
    • (2005) International Journal of E-Business Research , vol.1 , Issue.1 , pp. 54-69
    • Yee, G.1    Korba, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.