-
1
-
-
77949580359
-
On analyzing and specifying concerns for data as a service
-
M. Kirchberg, P. C. K. Hung, B. Carminati, C.-H. Chi, R. Kanagasabai, E. D. Valle, K.-C. Lan, and L.-J. Chen, Eds. IEEE
-
H. L. Truong and S. Dustdar, "On analyzing and specifying concerns for data as a service," in APSCC, M. Kirchberg, P. C. K. Hung, B. Carminati, C.-H. Chi, R. Kanagasabai, E. D. Valle, K.-C. Lan, and L.-J. Chen, Eds. IEEE, 2009, pp. 87-94.
-
(2009)
APSCC
, pp. 87-94
-
-
Truong, H.L.1
Dustdar, S.2
-
2
-
-
0006917446
-
Internet privacy - Introduction
-
L. F. Cranor, "Internet privacy - introduction," Commun. ACM, vol. 42, no. 2, pp. 28-31, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 28-31
-
-
Cranor, L.F.1
-
3
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM Comput. Surv., vol. 42, no. 4, pp. 1-53, 2010.
-
(2010)
ACM Comput. Surv.
, vol.42
, Issue.4
, pp. 1-53
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
4
-
-
1542300219
-
Preserving privacy in web services
-
New York, NY, USA: ACM
-
A. Rezgui, M. Ouzzani, A. Bouguettaya, and B. Medjahed, "Preserving privacy in Web services," in WIDM '02: Proceedings of the 4th international workshop on Web information and data management. New York, NY, USA: ACM, 2002, pp. 56-62.
-
(2002)
WIDM '02: Proceedings of the 4th International Workshop on Web Information and Data Management
, pp. 56-62
-
-
Rezgui, A.1
Ouzzani, M.2
Bouguettaya, A.3
Medjahed, B.4
-
5
-
-
33645694894
-
A semantic-based user privacy protection framework for web services
-
B. Mobasher and S. S. Anand, Eds. Springer
-
A. Tumer, A. Dogac, and I. H. Toroslu, "A semantic-based user privacy protection framework for Web services," in ITWP, ser. Lecture Notes in Computer Science, B. Mobasher and S. S. Anand, Eds., vol. 3169. Springer, 2003, pp. 289-305.
-
(2003)
ITWP, Ser. Lecture Notes in Computer Science
, vol.3169
, pp. 289-305
-
-
Tumer, A.1
Dogac, A.2
Toroslu, I.H.3
-
6
-
-
2642512091
-
A model for web services discovery with QoS
-
S. Ran, "A model for Web services discovery with QoS," SIGecom Exchanges, vol. 4, no. 1, pp. 1-10, 2003.
-
(2003)
SIGecom Exchanges
, vol.4
, Issue.1
, pp. 1-10
-
-
Ran, S.1
-
7
-
-
4344716019
-
Authorization and privacy for semantic web services
-
L. Kagal, M. Paolucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and privacy for semantic Web services," IEEE Intelligent Systems, vol. 19, no. 4, pp. 50-56, 2004.
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.4
, pp. 50-56
-
-
Kagal, L.1
Paolucci, M.2
Srinivasan, N.3
Denker, G.4
Finin, T.5
Sycara, K.6
-
9
-
-
84884623812
-
Privacy enforcement in data analysis workflows
-
Busan, South Korea, ser. CEUR Workshop Proceedings, T. Finin, L. Kagal, and D. Olmedilla, Eds. CEUR-WS.org, November
-
Y. Gil, W. Cheung, V. Ratnakar, and K. kin Chan, "Privacy enforcement in data analysis workflows," in Proceedings of the Workshop on Privacy Enforcement and Accountability with Semantics (PEAS2007) at ISWC/ASWC2007, Busan, South Korea, ser. CEUR Workshop Proceedings, T. Finin, L. Kagal, and D. Olmedilla, Eds., vol. 320. CEUR-WS.org, November 2007.
-
(2007)
Proceedings of the Workshop on Privacy Enforcement and Accountability with Semantics (PEAS2007) at ISWC/ASWC2007
, vol.320
-
-
Gil, Y.1
Cheung, W.2
Ratnakar, V.3
Kin Chan, K.4
-
10
-
-
77955877886
-
Reasoning about the appropriate use of private data through computational workflows
-
March [Online]. Available
-
Y. Gil and C. Fritz, "Reasoning about the appropriate use of private data through computational workflows," in Intelligent Information Privacy Management, Papers from the AAAI Spring Symposium, March 2010, pp. 69-74. [Online]. Available: gil-fri-aaai10ss.pdf
-
(2010)
Intelligent Information Privacy Management, Papers from the AAAI Spring Symposium
, pp. 69-74
-
-
Gil, Y.1
Fritz, C.2
-
11
-
-
70349096680
-
Privacy-preserving data mashup
-
New York, NY, USA: ACM
-
N. Mohammed, B. C. M. Fung, K. Wang, and P. C. K. Hung, "Privacy-preserving data mashup," in EDBT '09: Proceedings of the 12th International Conference on Extending Database Technology. New York, NY, USA: ACM, 2009, pp. 228-239.
-
(2009)
EDBT '09: Proceedings of the 12th International Conference on Extending Database Technology
, pp. 228-239
-
-
Mohammed, N.1
Fung, B.C.M.2
Wang, K.3
Hung, P.C.K.4
-
12
-
-
79951826623
-
Integration and verification of privacy policies using DSML's structural semantics in a SOA-based workflow environment
-
09/2009
-
Y. Lee, J. Werner, and J. Sztipanovits, "Integration and verification of privacy policies using DSML's structural semantics in a SOA-based workflow environment," Journal of Korean Society for Internet Information, vol. 10, no. 149, 09/2009 2009.
-
(2009)
Journal of Korean Society for Internet Information
, vol.10
, Issue.149
-
-
Lee, Y.1
Werner, J.2
Sztipanovits, J.3
-
15
-
-
34748816024
-
Privacy-preserving data integration and sharing
-
New York, NY, USA: ACM
-
C. Clifton, M. Kantarcioǧlu, A. Doan, G. Schadow, J. Vaidya, A. Elmagarmid, and D. Suciu, "Privacy-preserving data integration and sharing," in DMKD '04: Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery. New York, NY, USA: ACM, 2004, pp. 19-26.
-
(2004)
DMKD '04: Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery
, pp. 19-26
-
-
Clifton, C.1
Kantarcioǧlu, M.2
Doan, A.3
Schadow, G.4
Vaidya, J.5
Elmagarmid, A.6
Suciu, D.7
-
16
-
-
70350759690
-
And what can context do for data?
-
C. Bolchini, C. A. Curino, G. Orsi, E. Quintarelli, R. Rossato, F. A. Schreiber, and L. Tanca, "And what can context do for data?" Commun. ACM, vol. 52, no. 11, pp. 136-140, 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.11
, pp. 136-140
-
-
Bolchini, C.1
Curino, C.A.2
Orsi, G.3
Quintarelli, E.4
Rossato, R.5
Schreiber, F.A.6
Tanca, L.7
-
18
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity," ACM Trans. Knowl. Discov. Data, vol. 1, no. 1, p. 3, 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
19
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and I-diversity
-
DOI 10.1109/ICDE.2007.367856, 4221659, 23rd International Conference on Data Engineering, ICDE 2007
-
N. Li, T. Li, and S. Venkatasubramanian, "t-closeness: Privacy beyond k-anonymity and l-diversity," in ICDE. IEEE, 2007, pp. 106-115. (Pubitemid 47422014)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 106-115
-
-
Ninghui, L.1
Tiancheng, L.2
Venkatasubramanian, S.3
-
20
-
-
62949230222
-
HRESTS: An HTML microformat for describing RESTful web services
-
IEEE
-
J. Kopecký, K. Gomadam, and T. Vitvar, "hRESTS: An HTML microformat for describing RESTful Web services," in Web Intelligence. IEEE, 2008, pp. 619-625.
-
(2008)
Web Intelligence
, pp. 619-625
-
-
Kopecký, J.1
Gomadam, K.2
Vitvar, T.3
-
21
-
-
36348954234
-
Sa-rest and (s) mashups: Adding semantics to RESTful services
-
IEEE Computer Society
-
J. Lathem, K. Gomadam, and A. P. Sheth, "Sa-rest and (s) mashups: Adding semantics to RESTful services," in ICSC. IEEE Computer Society, 2007, pp. 469-476.
-
(2007)
ICSC
, pp. 469-476
-
-
Lathem, J.1
Gomadam, K.2
Sheth, A.P.3
-
22
-
-
78650721963
-
HRESTS & MicroWSMO
-
[Online]. Available
-
J. Kopecký, T. Vitvar, D. Fensel, and K. Gomadam, "hRESTS & MicroWSMO," STI International, Tech. Rep., 2009. [Online]. Available: http://cms-wg.sti2.org/TR/d12/
-
(2009)
STI International, Tech. Rep.
-
-
Kopecký, J.1
Vitvar, T.2
Fensel, D.3
Gomadam, K.4
-
23
-
-
79951817340
-
-
July 5 internet-Draft
-
M. Atkins, W. Norris, C. Messina, M. Keller, and R. Dolin, "Activity streams concepts and representations (draft)," http://activitystrea.ms/ head/json-activity.html, July 5 2010, internet-Draft.
-
(2010)
Activity Streams Concepts and Representations (draft)
-
-
Atkins, M.1
Norris, W.2
Messina, C.3
Keller, M.4
Dolin, R.5
|