-
3
-
-
70349264141
-
A Four-Layer model for security of digital rights management
-
E. Diehl, "A Four-Layer model for security of digital rights management," in Proc. of the 8th ACM workshop on DRM, pp. 19-28, 2008.
-
(2008)
Proc. of the 8th ACM Workshop on DRM
, pp. 19-28
-
-
Diehl, E.1
-
4
-
-
0036431099
-
Applying digital rights management systems to privacy rights management
-
S. Kenny, and L. Korba,"Applying digital rights management systems to privacy rights management," Computer and security, vol.21, no.7, pp. 648-664, 2002.
-
(2002)
Computer and Security
, vol.21
, Issue.7
, pp. 648-664
-
-
Kenny, S.1
Korba, L.2
-
5
-
-
77954324120
-
Towards an open, trusted digital rights management platform
-
A. Cooper and A. Martin." Towards an open, trusted digital rights management platform," in Proc. of the ACM workshop on DRM, pp 79-88, 2006.
-
(2006)
Proc. of the ACM Workshop on DRM
, pp. 79-88
-
-
Cooper, A.1
Martin, A.2
-
6
-
-
77956280936
-
Traitor-tracing
-
B. Chor, A. Fait, and M. Naor, " Traitor-tracing," in Proc. of Crypto 94, pp. 257-270, 1994.
-
(1994)
Proc. of Crypto
, vol.94
, pp. 257-270
-
-
Chor, B.1
Fait, A.2
Naor, M.3
-
7
-
-
0013138808
-
Dynamic traitor-tracing
-
A. Fiat and T.Tassa, "Dynamic traitor-tracing," J. of Cryptology, vol.14, pp. 211-223, 2001.
-
(2001)
J. of Cryptology
, vol.14
, pp. 211-223
-
-
Fiat, A.1
Tassa, T.2
-
13
-
-
84937418847
-
Efficient asymmetric self-enforcement scheme with public traceability
-
H. Komaki, Y. Watanabe, G. Hanaoka, and H. mai, "Efficient asymmetric self-enforcement scheme with public traceability," LNCS public key cryptography, pp. 225-239, 2000.
-
(2000)
LNCS Public Key Cryptography
, pp. 225-239
-
-
Komaki, H.1
Watanabe, Y.2
Hanaoka, G.3
Mai, H.4
-
16
-
-
0035919180
-
National health information privacy, regulations under the health insurance portability trod acccaintithility act
-
O. Gostin, "National health information privacy, regulations under the health insurance portability trod acccaintithility act," J. of the American medical association, vol.285, no.23. pp. 3015-3621, 2001.
-
(2001)
J. of the American Medical Association
, vol.285
, Issue.23
, pp. 3015-3621
-
-
Gostin, O.1
-
17
-
-
33947218255
-
In sickness, health, and cyberspace: Protecting the security of electronic private health information
-
S. Hoffman and A. Podgurski, "In sickness, health, and cyberspace: protecting the security of electronic private health information," Case legal studies research paper, pp. 06-15, 2006.
-
(2006)
Case Legal Studies Research Paper
, pp. 06-15
-
-
Hoffman, S.1
Podgurski, A.2
-
18
-
-
33947534852
-
Health policy and ethics: Patient confidentiality in the research use of clinical medical databases
-
R. Krishna, K. Kelleher, and E Stahl berg, "Health policy and ethics: patient confidentiality in the research use of clinical medical databases," American J. of public health, vol 97, no.4, 2007.
-
(2007)
American J. of Public Health
, vol.97
, Issue.4
-
-
Krishna, R.1
Kelleher, K.2
Stahl Berg, E.3
-
19
-
-
35248819132
-
Medical information privacy assurance: Cryptographic and system aspects
-
O. Ateniese, R. Curtmola, B. Medeiros, and D. Davis, "Medical information privacy assurance: cryptographic and system aspects," Lecture note in security in communication network, pp. 199-218, 2003.
-
(2003)
Lecture Note in Security in Communication Network
, pp. 199-218
-
-
Ateniese, O.1
Curtmola, R.2
Medeiros, B.3
Davis, D.4
-
20
-
-
28444478342
-
Privacy and ownership preserving of out-sourced medical data
-
E. Bertino, B.C. Ooi, Y. Yang, and R.H. Deng. "Privacy and ownership preserving of out-sourced medical data," in Proc. of 21st int. data engineering, pp. 521-532, 2005.
-
(2005)
Proc. of 21st Int. Data Engineering
, pp. 521-532
-
-
Bertino, E.1
Ooi, B.C.2
Yang, Y.3
Deng, R.H.4
-
21
-
-
3042770199
-
Computational disclosure control for medical microdata: The datally system
-
National Academy Press
-
I. Sweeney, "Computational disclosure control for medical microdata: The datally system," in record linkage techniques workshop, National Academy Press, pp. 442-453, 1999.
-
(1999)
Record Linkage Techniques Workshop
, pp. 442-453
-
-
Sweeney, I.1
-
23
-
-
84874933913
-
-
R. Anderson, F. Bozek, T. Longstaff, W. Meitzler, M. Skroch, and K. V. Wyk, "Research on Mitigating the Insider Threat to Information Systems," 2000.
-
(2000)
Research on Mitigating the Insider Threat to Information Systems
-
-
Anderson, R.1
Bozek, F.2
Longstaff, T.3
Meitzler, W.4
Skroch, M.5
Wyk, K.V.6
-
26
-
-
3242743529
-
Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behaviors
-
A. Acquisti and I. Grossklags, "Losses, gains, and hyperbolic discounting: an experimental approach to information security attitudes and behaviors," Second workshop on the economics of information security, 2003.
-
(2003)
Second Workshop on the Economics of Information Security
-
-
Acquisti, A.1
Grossklags, I.2
-
27
-
-
67650897413
-
When 25 cents is too much: An experiment on willingness-to-sell and willingness-toprotect personal information
-
J. Grossklags and A. Acquisti, "When 25 cents is too much: an experiment on willingness-to-sell and willingness-toprotect personal information," 6th workshop on economics of information security, 2007.
-
(2007)
6th Workshop on Economics of Information Security
-
-
Grossklags, J.1
Acquisti, A.2
-
30
-
-
20944447987
-
An economics perspective on the sharing of information related to security breaches: Concepts and empirical evidence
-
L. A. Gordon, " An economics perspective on the sharing of information related to security breaches: concepts and empirical evidence," workshop on the economics of information security, 2002.
-
(2002)
Workshop on the Economics of Information Security
-
-
Gordon, L.A.1
-
31
-
-
72249119892
-
The economic consequences of sharing security information
-
E. Gal and A. Ghose, "The economic consequences of sharing security information," Economics of Information Security, pp. 95-104, 2006.
-
(2006)
Economics of Information Security
, pp. 95-104
-
-
Gal, E.1
Ghose, A.2
-
36
-
-
77957959481
-
On the viability of privacyenhancing technologies in a self-regulated business-toconsumer market: Will privacy remain a luxury good?
-
R. Bohme and S. Kohlc, "On the viability of privacyenhancing technologies in a self- regulated business-toconsumer market: will privacy remain a luxury good?," 6th workshop on economics of information security, 2007.
-
(2007)
6th Workshop on Economics of Information Security
-
-
Bohme, R.1
Kohlc, S.2
-
38
-
-
0016555241
-
The protection of information in computer systems
-
Sept
-
J.H. Saltier and M.D. Schroeder, "The protection of information in computer systems," in Proc. of the IEEE. vol.63, no.9, pp. 1278-1308, Sept 1975.
-
(1975)
Proc. of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltier, J.H.1
Schroeder, M.D.2
-
39
-
-
0141642166
-
On the security of some password authentication protocols
-
B. Hsieh, H. Sun. and T. Hwang. " On the security of some password authentication protocols:' J. of informatica. no 2, pp. 195-204, 2003.
-
(2003)
J. of Informatica
, Issue.2
, pp. 195-204
-
-
Hsieh, B.1
Sun., H.2
Hwang, T.3
-
40
-
-
35248831207
-
Breaking and repairing asymmetric public-key traitor-tracing
-
A. Kitiyias and M. Yung, " Breaking and repairing asymmetric public-key traitor-tracing," LNCS digital rights management, pp. 32-50, 2003.
-
(2003)
LNCS Digital Rights Management
, pp. 32-50
-
-
Kitiyias, A.1
Yung, M.2
-
41
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," Advances in Cryptology, pp. 506-522, 2004.
-
(2004)
Advances in Cryptology
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
42
-
-
0028592391
-
Electronic marking and identification techniques to discourage document copying
-
J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, "Electronic marking and identification techniques to discourage document copying," in Proc. of IEEE INFOCOM, 1994, 3, pp. 1278 -1287.
-
(1994)
Proc. of IEEE INFOCOM
, vol.3
, pp. 1278-1287
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.3
O'gorman, L.4
-
43
-
-
0002474815
-
Hiding information in document images
-
J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, "Hiding information in document images," in Proc. of the 29th Annual Conference on Information Sciences and Systems, 1995, pp. 482-489.
-
(1995)
Proc. of the 29th Annual Conference on Information Sciences and Systems
, pp. 482-489
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.3
O'gorman, L.4
|