메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1086-1092

Towards a risk-driven methodology for privacy metrics development

Author keywords

Cloud services; Privacy; Privacy metrics

Indexed keywords

CLOUD COMPUTING; CLOUD SERVICES; CRITICAL DATA; PRIVACY; PRIVACY METRICS; PRIVACY REQUIREMENTS; SYSTEM REQUIREMENTS; THREAT ANALYSIS;

EID: 78649305413     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SocialCom.2010.161     Document Type: Conference Paper
Times cited : (11)

References (28)
  • 1
    • 77958019527 scopus 로고    scopus 로고
    • Development of measurable security for a distributed messaging system
    • Published in March 2010
    • R. Savola and H. Abie, "Development of measurable security for a distributed messaging system," International Journal on Advances in Security, Vol. 2, No. 4, 2009, pp. 358-380 (Published in March 2010).
    • (2009) International Journal on Advances in Security , vol.2 , Issue.4 , pp. 358-380
    • Savola, R.1    Abie, H.2
  • 2
    • 78649248918 scopus 로고    scopus 로고
    • Version 1.0. Available: July 4
    • European Privacy Seal, "EuroPriSe criteria," Version 1.0. Available: www.european-privacy-seal.eu. [July 4, 2010].
    • (2010) EuroPriSe Criteria
  • 3
    • 78149392355 scopus 로고    scopus 로고
    • A security metrics taxonomization model for software-intensive systems
    • Dec.
    • R. Savola, "A security metrics taxonomization model for software-intensive systems," Journal of Information Processing Systems, Vol. 5, No. 4, Dec. 2009, pp. 197-206.
    • (2009) Journal of Information Processing Systems , vol.5 , Issue.4 , pp. 197-206
    • Savola, R.1
  • 6
    • 78149392139 scopus 로고    scopus 로고
    • On the feasibility of utilizing security metrics in software-intensive systems
    • Jan.
    • R. Savola, "On the feasibility of utilizing security metrics in software-intensive systems," International Journal of Computer Science and Network Security, Vol. 10, No. 1, Jan. 2010, pp. 230-239.
    • (2010) International Journal of Computer Science and Network Security , vol.10 , Issue.1 , pp. 230-239
    • Savola, R.1
  • 7
    • 45449088326 scopus 로고    scopus 로고
    • Validation of predictions with measurements
    • I. Eusgeld, F. C. Freiling and R. Reussner (Eds.): Dependability Metrics, Springer-Verlag
    • R. Böhme and R. Reussner, "Validation of predictions with measurements," in I. Eusgeld, F. C. Freiling and R. Reussner (Eds.): Dependability Metrics, LNCS 4909, Springer-Verlag, 2008, pp. 14-18.
    • (2008) LNCS , vol.4909 , pp. 14-18
    • Böhme, R.1    Reussner, R.2
  • 10
    • 77950567715 scopus 로고    scopus 로고
    • Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
    • R. Gellman, "Privacy in the clouds: risks to privacy and confidentiality from cloud computing," World Privacy Forum (WPF) Report, Feb. 23, 2009.
    • World Privacy Forum (WPF) Report, Feb. 23, 2009
    • Gellman, R.1
  • 11
    • 49449122896 scopus 로고    scopus 로고
    • A scaling method for priorities in hierarchical structures
    • T.L. Saaty, "A scaling method for priorities in hierarchical structures," Journal of Mathematical Psychology, 15, 234-281.
    • Journal of Mathematical Psychology , vol.15 , pp. 234-281
    • Saaty, T.L.1
  • 14
    • 79952066716 scopus 로고    scopus 로고
    • Security-measurability enhancing mechanisms for a distributed adaptive security monitoring system
    • R. Savola and P. Heinonen, "Security-measurability enhancing mechanisms for a distributed adaptive security monitoring system," SECURWARE '09, Venice, Italy, July 18-25, 2010, 10 p.
    • SECURWARE '09, Venice, Italy, July 18-25, 2010 , pp. 10
    • Savola, R.1    Heinonen, P.2
  • 16
  • 18
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, 24(2):84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 19
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum, "The dining cryptographers problem: unconditional sender and recipient untraceability," Journal of Cryptology, 1(1):65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 20
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability and pseudonymity - A proposal for terminology
    • Proc. of Int. Workshop on the Design Issues in Anonymity and Observability
    • A. Pfitzmann and M. Kohntopp, "Anonymity, unobservability and pseudonymity - a proposal for terminology," Proc. of Int. Workshop on the Design Issues in Anonymity and Observability, LNCS 2009, 2000.
    • (2000) LNCS , vol.2009
    • Pfitzmann, A.1    Kohntopp, M.2
  • 21
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • Workshop on Privacy Enhancing Technologies
    • C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," Workshop on Privacy Enhancing Technologies, LNCS 2482, 2002.
    • (2002) LNCS , vol.2482
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 22
    • 84957802536 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • nd Int. Workshop on Privacy Enhancing Technologies
    • nd Int. Workshop on Privacy Enhancing Technologies, LNCS 2482, 2003.
    • (2003) LNCS , vol.2482
    • Serjantov, A.1    Danezis, G.2
  • 26
    • 0002265410 scopus 로고    scopus 로고
    • The platform for privacy preferences
    • Feb.
    • J. Reagle and L. F. Cranor, "The platform for privacy preferences," Communications of the ACM, 42(2), pp. 48-55, Feb. 1997.
    • (1997) Communications of the ACM , vol.42 , Issue.2 , pp. 48-55
    • Reagle, J.1    Cranor, L.F.2
  • 27
    • 78649237057 scopus 로고    scopus 로고
    • Privacy metrics and boundaries
    • Erasmus Research Institute of Management (ERIM).
    • L.-F. Pau, "Privacy metrics and boundaries," Research Paper ERS-2005-013-LIS, Erasmus Research Institute of Management (ERIM).
    • Research Paper ERS-2005-013-LIS
    • Pau, L.-F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.