-
1
-
-
77958019527
-
Development of measurable security for a distributed messaging system
-
Published in March 2010
-
R. Savola and H. Abie, "Development of measurable security for a distributed messaging system," International Journal on Advances in Security, Vol. 2, No. 4, 2009, pp. 358-380 (Published in March 2010).
-
(2009)
International Journal on Advances in Security
, vol.2
, Issue.4
, pp. 358-380
-
-
Savola, R.1
Abie, H.2
-
2
-
-
78649248918
-
-
Version 1.0. Available: July 4
-
European Privacy Seal, "EuroPriSe criteria," Version 1.0. Available: www.european-privacy-seal.eu. [July 4, 2010].
-
(2010)
EuroPriSe Criteria
-
-
-
3
-
-
78149392355
-
A security metrics taxonomization model for software-intensive systems
-
Dec.
-
R. Savola, "A security metrics taxonomization model for software-intensive systems," Journal of Information Processing Systems, Vol. 5, No. 4, Dec. 2009, pp. 197-206.
-
(2009)
Journal of Information Processing Systems
, vol.5
, Issue.4
, pp. 197-206
-
-
Savola, R.1
-
6
-
-
78149392139
-
On the feasibility of utilizing security metrics in software-intensive systems
-
Jan.
-
R. Savola, "On the feasibility of utilizing security metrics in software-intensive systems," International Journal of Computer Science and Network Security, Vol. 10, No. 1, Jan. 2010, pp. 230-239.
-
(2010)
International Journal of Computer Science and Network Security
, vol.10
, Issue.1
, pp. 230-239
-
-
Savola, R.1
-
7
-
-
45449088326
-
Validation of predictions with measurements
-
I. Eusgeld, F. C. Freiling and R. Reussner (Eds.): Dependability Metrics, Springer-Verlag
-
R. Böhme and R. Reussner, "Validation of predictions with measurements," in I. Eusgeld, F. C. Freiling and R. Reussner (Eds.): Dependability Metrics, LNCS 4909, Springer-Verlag, 2008, pp. 14-18.
-
(2008)
LNCS
, vol.4909
, pp. 14-18
-
-
Böhme, R.1
Reussner, R.2
-
8
-
-
0346052082
-
Towards a framework for security measurement
-
th National Information Systems Security Conference, Baltimore, MD, Oct. 1997, pp. 522-533.
-
th National Information Systems Security Conference, Baltimore, MD, Oct. 1997
, pp. 522-533
-
-
Wang, C.1
Wulf, W.A.2
-
10
-
-
77950567715
-
Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
-
R. Gellman, "Privacy in the clouds: risks to privacy and confidentiality from cloud computing," World Privacy Forum (WPF) Report, Feb. 23, 2009.
-
World Privacy Forum (WPF) Report, Feb. 23, 2009
-
-
Gellman, R.1
-
11
-
-
49449122896
-
A scaling method for priorities in hierarchical structures
-
T.L. Saaty, "A scaling method for priorities in hierarchical structures," Journal of Mathematical Psychology, 15, 234-281.
-
Journal of Mathematical Psychology
, vol.15
, pp. 234-281
-
-
Saaty, T.L.1
-
14
-
-
79952066716
-
Security-measurability enhancing mechanisms for a distributed adaptive security monitoring system
-
R. Savola and P. Heinonen, "Security-measurability enhancing mechanisms for a distributed adaptive security monitoring system," SECURWARE '09, Venice, Italy, July 18-25, 2010, 10 p.
-
SECURWARE '09, Venice, Italy, July 18-25, 2010
, pp. 10
-
-
Savola, R.1
Heinonen, P.2
-
16
-
-
0035517699
-
Protecting respondents' identity in microdata release
-
P. Samarati, "Protecting respondents' identity in microdata release," IEEE Tr. on Knowledge and Data Engineering, 13 (6), 2001.
-
(2001)
IEEE Tr. on Knowledge and Data Engineering
, vol.13
, Issue.6
-
-
Samarati, P.1
-
18
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
19
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum, "The dining cryptographers problem: unconditional sender and recipient untraceability," Journal of Cryptology, 1(1):65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
20
-
-
84937564790
-
Anonymity, unobservability and pseudonymity - A proposal for terminology
-
Proc. of Int. Workshop on the Design Issues in Anonymity and Observability
-
A. Pfitzmann and M. Kohntopp, "Anonymity, unobservability and pseudonymity - a proposal for terminology," Proc. of Int. Workshop on the Design Issues in Anonymity and Observability, LNCS 2009, 2000.
-
(2000)
LNCS
, vol.2009
-
-
Pfitzmann, A.1
Kohntopp, M.2
-
21
-
-
84957800033
-
Towards measuring anonymity
-
Workshop on Privacy Enhancing Technologies
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," Workshop on Privacy Enhancing Technologies, LNCS 2482, 2002.
-
(2002)
LNCS
, vol.2482
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
22
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
nd Int. Workshop on Privacy Enhancing Technologies
-
nd Int. Workshop on Privacy Enhancing Technologies, LNCS 2482, 2003.
-
(2003)
LNCS
, vol.2482
-
-
Serjantov, A.1
Danezis, G.2
-
25
-
-
74049116479
-
A distortion-based metric for location privacy
-
R. Shokri, J. Freudiger, M. Jadliwala, and J.-P. Hubaux, "A distortion-based metric for location privacy," ACM Workshop on Privacy in the Electronic Society, 2009.
-
ACM Workshop on Privacy in the Electronic Society, 2009
-
-
Shokri, R.1
Freudiger, J.2
Jadliwala, M.3
Hubaux, J.-P.4
-
26
-
-
0002265410
-
The platform for privacy preferences
-
Feb.
-
J. Reagle and L. F. Cranor, "The platform for privacy preferences," Communications of the ACM, 42(2), pp. 48-55, Feb. 1997.
-
(1997)
Communications of the ACM
, vol.42
, Issue.2
, pp. 48-55
-
-
Reagle, J.1
Cranor, L.F.2
-
27
-
-
78649237057
-
Privacy metrics and boundaries
-
Erasmus Research Institute of Management (ERIM).
-
L.-F. Pau, "Privacy metrics and boundaries," Research Paper ERS-2005-013-LIS, Erasmus Research Institute of Management (ERIM).
-
Research Paper ERS-2005-013-LIS
-
-
Pau, L.-F.1
|