메뉴 건너뛰기




Volumn , Issue 113, 2011, Pages 1-30

Privacy enhancing technologies: A review

Author keywords

PETs; Privacy; Privacy enhancing technologies

Indexed keywords

DATA SUBJECTS; PERSONALLY IDENTIFIABLE INFORMATION; PETS; PRIVACY ENHANCING TECHNOLOGIES; THIRD PARTIES;

EID: 80051632898     PISSN: None     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (13)

References (116)
  • 1
    • 84957795309 scopus 로고    scopus 로고
    • Private Authentication
    • Privacy Enhancing Technologies
    • Martín Abadi. Private authentication. In Privacy Enhancing Technologies, volume 2482 of LNCS, pages 27-40, 2003. ISBN 3-540-00565-X. (Pubitemid 36309877)
    • (2003) Lecture Notes in Computer Science , Issue.2482 , pp. 27-40
    • Abadi, M.1
  • 2
    • 14744280530 scopus 로고    scopus 로고
    • Conditioning prices on purchase history
    • DOI 10.1287/mksc.1040.0103
    • Alessandro Acquisti and Hal R. Varian. Conditioning prices on purchase history. Marketing Science, 24:367-381, 2005. (Pubitemid 41409331)
    • (2005) Marketing Science , vol.24 , Issue.3 , pp. 367-381
    • Acquisti, A.1    Varian, H.R.2
  • 3
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • ACM Press, May, ISBN 1-581-13218-2
    • Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. In Proc. of the ACM SIGMOD, pages 439-450. ACM Press, May 2000. ISBN 1-581-13218-2.
    • (2000) Proc. of the ACM SIGMOD , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 4
    • 0242674432 scopus 로고    scopus 로고
    • Hippocratic databases
    • Morgan Kaufmann
    • Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Hippocratic databases. In VLDB, pages 143-154. Morgan Kaufmann, 2002.
    • (2002) VLDB , pp. 143-154
    • Agrawal, R.1    Kiernan, J.2    Srikant, R.3    Xu, Y.4
  • 6
    • 84957801565 scopus 로고    scopus 로고
    • Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education
    • Privacy Enhancing Technologies
    • Adil Alsaid and David Martin. Detecting web bugs with bugnosis: Privacy advocacy through education. In Privacy Enhancing Technologies, volume 2482 of Lecture Notes in Computer Science, pages 13-26. Springer, 2003. (Pubitemid 36309876)
    • (2003) Lecture Notes in Computer Science , Issue.2482 , pp. 13-26
    • Alsaid, A.1    Martin, D.2
  • 9
    • 35248893400 scopus 로고    scopus 로고
    • Privacy enhancing technologies: A review
    • John Argyrakis, Stefanos Gritzalis, and Chris Kioulafas. Privacy enhancing technologies: A review. In EGOV, pages 282-287, 2003.
    • (2003) EGOV , pp. 282-287
    • Argyrakis, J.1    Gritzalis, S.2    Kioulafas, C.3
  • 10
    • 84902506864 scopus 로고    scopus 로고
    • Privacy issues in RFID banknote protection schemes
    • Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, and Anas Abou El Kadam, editors, Toulouse, France, August, IFIP
    • Gildas Avoine. Privacy issues in RFID banknote protection schemes. In Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, and Anas Abou El Kadam, editors, International Conference on Smart Card Research and Advanced Applications - CARDIS, pages 33-48, Toulouse, France, August 2004. IFIP.
    • (2004) International Conference on Smart Card Research and Advanced Applications - CARDIS , pp. 33-48
    • Avoine, G.1
  • 11
    • 77049125775 scopus 로고    scopus 로고
    • Privacy injector - Automated privacy enforcement through aspects
    • Springer, ISBN 3-540-68790-4
    • Chris Vanden Berghe and Matthias Schunter. Privacy injector - automated privacy enforcement through aspects. In Privacy Enhancing Technologies, volume 4258 of LNCS, pages 99-117. Springer, 2006. ISBN 3-540-68790-4.
    • (2006) Privacy Enhancing Technologies, volume 4258 of LNCS , pp. 99-117
    • Berghe, C.V.1    Schunter, M.2
  • 12
    • 78049352261 scopus 로고    scopus 로고
    • Exploring the feasibility of a spatial user interface paradigm for privacy-enhancing technologys
    • Springer Verlag
    • Mike Bergmann, Martin Rost, and John Sren Pettersson. Exploring the feasibility of a spatial user interface paradigm for privacy-enhancing technologys. In ISD '05, pages 437-448. Springer Verlag, 2005.
    • (2005) ISD '05 , pp. 437-448
    • Bergmann, M.1    Rost, M.2    Pettersson, J.S.3
  • 13
    • 85001786260 scopus 로고    scopus 로고
    • Secure and selective dissemination of xml documents
    • ISSN 1094-9224
    • Elisa Bertino and Elena Ferrari. Secure and selective dissemination of xml documents. ACM Trans. Inf. Syst. Secur., 5(3):290-331, 2002. ISSN 1094-9224.
    • (2002) ACM Trans. Inf. Syst. Secur. , vol.5 , Issue.3 , pp. 290-331
    • Bertino, E.1    Ferrari, E.2
  • 16
    • 17044362511 scopus 로고    scopus 로고
    • Discussion Papers 1394, Northwestern University, Center for Mathematical Studies in Economics and Management Science, July
    • Giacomo Calzolari and Alessandro Pavan. On the optimality of privacy in sequential contracting. Discussion Papers 1394, Northwestern University, Center for Mathematical Studies in Economics and Management Science, July 2004.
    • (2004) On the Optimality of Privacy in Sequential Contracting
    • Calzolari, G.1    Pavan, A.2
  • 18
    • 48049100992 scopus 로고    scopus 로고
    • Query privacy in wireless sensor networks
    • Bogdan Carbunar, Yang Yu,Weidong Shi, Michael Pearce, and Venu Vasudevan. Query privacy in wireless sensor networks. In SECON, pages 203-212, 2007.
    • (2007) SECON , pp. 203-212
    • Carbunar, B.1    Yu, Y.2    Shi, W.3    Pearce, M.4    Vasudevan, V.5
  • 20
    • 70450255117 scopus 로고    scopus 로고
    • A semantic web based framework for social network access control
    • New York, NY, USA, ACM. ISBN 978-1-60558-537-6. doi
    • Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, and Bhavani Thuraisingham. A semantic web based framework for social network access control. In SACMAT '09, pages 177-186, New York, NY, USA, 2009. ACM. ISBN 978-1-60558-537-6. doi: http://doi.acm.org/10.1145/1542207.1542237.
    • (2009) SACMAT '09 , pp. 177-186
    • Carminati, B.1    Ferrari, E.2    Heatherly, R.3    Kantarcioglu, M.4    Thuraisingham, B.5
  • 21
    • 0004055363 scopus 로고
    • Showing credentials without identification. signatures transferred between unconditionally unlinkable pseudonyms
    • New York, NY, USA, Springer-Verlag New York, Inc. ISBN 0-387-16468-5
    • D Chaum. Showing credentials without identification. signatures transferred between unconditionally unlinkable pseudonyms. In EUROCRYPT '85, pages 241-244, New York, NY, USA, 1986. Springer-Verlag New York, Inc. ISBN 0-387-16468-5.
    • (1986) EUROCRYPT '85 , pp. 241-244
    • Chaum, D.1
  • 22
    • 0027005999 scopus 로고
    • Achieving electronic privacy
    • David Chaum. Achieving electronic privacy. Scientific American, pages 91-101, 1992.
    • (1992) Scientific American , pp. 91-101
    • Chaum, D.1
  • 23
    • 33750283449 scopus 로고    scopus 로고
    • Privacy preserving data classification with rotation perturbation
    • DOI 10.1109/ICDM.2005.121, 1565733, Proceedings - Fifth IEEE International Conference on Data Mining, ICDM 2005
    • K. Chen and L. Liu. Privacy preserving data classification with rotation perturbation. In ICDM '05, pages 589-592, Houston, TX, November 2005. (Pubitemid 47385747)
    • (2005) Proceedings - IEEE International Conference on Data Mining, ICDM , pp. 589-592
    • Chen, K.1    Liu, L.2
  • 25
    • 50049116165 scopus 로고    scopus 로고
    • A customizable reputation-based privacy assurance system using active feedback
    • Stephen Crane and Marco Casassa Mont. A customizable reputation-based privacy assurance system using active feedback. In Securecomm and Workshops, 2006, pages 1-8, 2006.
    • (2006) Securecomm and Workshops, 2006 , pp. 1-8
    • Crane, S.1    Mont, M.C.2
  • 26
    • 33749617824 scopus 로고    scopus 로고
    • User interfaces for privacy agents
    • DOI 10.1145/1165734.1165735
    • Lorrie Faith Cranor, Praveen Guduru, and Manjula Arjula. User interfaces for privacy agents. ACM Trans. Comput.-Hum. Interact., 13(2):135-178, 2006. ISSN 1073-0516. doi: http://doi.acm.org/10.1145/1165734.1165735. (Pubitemid 44546465)
    • (2006) ACM Transactions on Computer-Human Interaction , vol.13 , Issue.2 , pp. 135-178
    • Cranor, L.F.1    Guduru, P.2    Arjula, M.3
  • 27
    • 52949087952 scopus 로고    scopus 로고
    • A robust sampling-based framework for privacy preserving olap
    • Berlin, Heidelberg, Springer-Verlag. ISBN 978-3-540-85835-5
    • Alfredo Cuzzocrea, Vincenzo Russo, and Domenico Saccà. A robust sampling-based framework for privacy preserving olap. In DaWaK '08, pages 97-114, Berlin, Heidelberg, 2008. Springer-Verlag. ISBN 978-3-540-85835-5.
    • (2008) DaWaK ' 08 , pp. 97-114
    • Cuzzocrea, A.1    Russo, V.2    Saccà, D.3
  • 28
    • 84944048132 scopus 로고    scopus 로고
    • The Ponder Policy Specification Language
    • Policies for Distributed Systems and Networks
    • Nicodemos Damianou, Naranker Dulay, Emil Lupu, and Nicodemos Damianou Naranker Dulay. The ponder policy specification language. In Lecture Notes in Computer Science, pages 18-38. Springer-Verlag, 2001. (Pubitemid 33225338)
    • (2001) Lecture Notes in Computer Science , Issue.1995 , pp. 18-38
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 29
    • 74049129119 scopus 로고    scopus 로고
    • The economics of mass surveillance - and the questionable value of anonymous communications
    • George Danezis and Bettina Wittneben. The economics of mass surveillance - and the questionable value of anonymous communications. In WEIS 2006, 2006.
    • (2006) WEIS 2006
    • Danezis, G.1    Wittneben, B.2
  • 31
    • 80051615593 scopus 로고    scopus 로고
    • A Passive Attack on the Privacy of Web Users Using Standard Log Information
    • Privacy Enhancing Technologies
    • Thomas Demuth. A passive attack on the privacy of web users using standard log information. In Privacy Enhancing Technologies, volume 2482 of LNCS, pages 179- 193. Springer, 2003. ISBN 3-540-00565-X. (Pubitemid 36309888)
    • (2003) Lecture Notes in Computer Science , Issue.2482 , pp. 179-193
    • Demuth, T.1
  • 33
    • 33645240198 scopus 로고    scopus 로고
    • The Free Haven Project: Distributed Anonymous Storage Service
    • Designing Privacy Enhancing Technologies
    • Roger Dingledine, Michael J. Freedman, and David Molnar. The free haven project: Distributed anonymous storage service. In In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, pages 67-95, 2000. (Pubitemid 33241788)
    • (2001) Lecture Notes in Computer Science , Issue.2009 , pp. 67-95
    • Dingledine, R.1    Freedman, M.J.2    Molnar, D.3
  • 36
    • 38049048780 scopus 로고    scopus 로고
    • A three-dimensional conceptual framework for database privacy
    • Josep Domingo-Ferrer. A three-dimensional conceptual framework for database privacy. In Secure Data Management, pages 193-202, 2007.
    • (2007) Secure Data Management , pp. 193-202
    • Domingo-Ferrer, J.1
  • 37
    • 63749113337 scopus 로고    scopus 로고
    • Location privacy via unlinkability: An alternative to cloaking and perturbation
    • Josep Domingo-Ferrer. Location privacy via unlinkability: an alternative to cloaking and perturbation. In PAIS, pages 1-2, 2008.
    • (2008) PAIS , pp. 1-2
    • Domingo-Ferrer, J.1
  • 39
    • 33645584057 scopus 로고    scopus 로고
    • Privacy-preserving multivariate statistical analysis: Linear regression and classification
    • Lake Buena Vista, FL, April
    • W. Du, Y. S. Han, and S. Chen. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In SDM '04, Lake Buena Vista, FL, April 2004.
    • (2004) SDM ' 04
    • Du, W.1    Han, Y.S.2    Chen, S.3
  • 42
    • 80051602326 scopus 로고    scopus 로고
    • European Union EU. Press release: Privacy enhancing technologies (pets)
    • European Union EU. Press release: Privacy enhancing technologies (pets), 2007. http: //europa.eu/rapid/pressReleasesAction.do?reference=MEMO/07/ 159&format= HTML&aged=0&language=EN&guiLanguage=en.%20Reference: %20MEMO/07/159.
    • (2007)
  • 44
    • 80051617201 scopus 로고    scopus 로고
    • Pseudonymizing Unix, and Log Files. Pseudonymizing unix log files
    • Ulrich Flegel, Pseudonymizing Unix, and Log Files. Pseudonymizing unix log files. In Infrastructure Security, 2002.
    • (2002) Infrastructure Security
    • Flegel, U.1
  • 48
    • 70350755795 scopus 로고    scopus 로고
    • Enhancing privacy in identity management systems
    • New York, NY, USA, ACM, ISBN 978-1-59593-883-1. doi
    • Steven Gevers, Verslype Verslype, and Bart De Decker. Enhancing privacy in identity management systems. In WPES '07, pages 60-63, New York, NY, USA, 2007. ACM. ISBN 978-1-59593-883-1. doi: http://doi.acm.org/10.1145/1314333. 1314344.
    • (2007) WPES ' 07 , pp. 60-63
    • Gevers, S.1    Verslype, V.2    De Decker, B.3
  • 49
    • 48649106873 scopus 로고    scopus 로고
    • Privacy-preserving data mining on moving object trajectories
    • Gyözö Gidófalvi, Xuegang Huang, and Torben Bach Pedersen. Privacy-preserving data mining on moving object trajectories. In MDM, pages 60-68, 2007.
    • (2007) MDM , pp. 60-68
    • Gidófalvi, G.1    Huang, X.2    Pedersen, T.B.3
  • 50
    • 40249092538 scopus 로고    scopus 로고
    • Privacy-enhancing technologies for the internet, ii: Five years later
    • Ian Goldberg. Privacy-enhancing technologies for the internet, ii: Five years later. In Privacy Enhancing Technologies, pages 1-12, 2002.
    • (2002) Privacy Enhancing Technologies , pp. 1-12
    • Goldberg, I.1
  • 55
    • 34249711260 scopus 로고    scopus 로고
    • Examining the content and privacy of web browsing incidental information
    • DOI 10.1145/1135777.1135801, Proceedings of the 15th International Conference on World Wide Web
    • Kirstie Hawkey and Kori M. Inkpen. Examining the content and privacy of web browsing incidental information. In WWW '06, pages 123-132, New York, NY, USA, 2006. ACM. ISBN 1-59593-323-9. doi: http://doi.acm.org/10.1145/1135777. 1135801. (Pubitemid 46946604)
    • (2006) Proceedings of the 15th International Conference on World Wide Web , pp. 123-132
    • Hawkey, K.1    Inkpen, K.M.2
  • 56
    • 33747736210 scopus 로고    scopus 로고
    • Privacy, property rights and efficiency: The economics of privacy as secrecy
    • DOI 10.1007/s11129-005-9004-7
    • Benjamin Hermalin and Michael Katz. Privacy, property rights and efficiency: The economics of privacy as secrecy. Quantitative Marketing and Economics, 4(3):209-239, September 2006. (Pubitemid 44269788)
    • (2006) Quantitative Marketing and Economics , vol.4 , Issue.3 , pp. 209-239
    • Hermalin, B.E.1    Katz, M.L.2
  • 57
    • 41549150768 scopus 로고    scopus 로고
    • Relying party credentials framework
    • ISSN 1389-5753
    • Amir Herzberg and Yosi Mass. Relying party credentials framework. Electronic Commerce Research, 4(1-2):23-39, 2004a. ISSN 1389-5753
    • (2004) Electronic Commerce Research , vol.4 , Issue.1-2 , pp. 23-39
    • Herzberg, A.1    Mass, Y.2
  • 58
    • 41549150768 scopus 로고    scopus 로고
    • Relying party credentials framework
    • Amir Herzberg and Yosi Mass. Relying party credentials framework. Electronic Commerce Research, 4(1-2):23-39, 2004b.
    • (2004) Electronic Commerce Research , vol.4 , Issue.1-2 , pp. 23-39
    • Herzberg, A.1    Mass, Y.2
  • 60
    • 80051619795 scopus 로고    scopus 로고
    • Information Commissioner's Office UK ICO
    • Information Commissioner's Office UK ICO. Data protection guidance note: Privacy enhancing technologies, 2007. http://www.ico.gov.uk/upload/documents/ library/data-protection/detailed-specialist-guides/privacy-enhancing- technologies-v2.pdf.
    • (2007) Data Protection Guidance Note: Privacy Enhancing Technologies
  • 62
    • 33749039193 scopus 로고    scopus 로고
    • Determining user privacy preferences by asking the right questions: An automated approach
    • WPES'05: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
    • Keith Irwin and Ting Yu. Determining user privacy preferences by asking the right questions: an automated approach. In WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pages 47-50, New York, NY, USA, 2005. ACM. ISBN 1-59593-228-3. doi: http://doi.acm.org/10.1145/1102199. 1102209. (Pubitemid 44447417)
    • (2005) WPES'05: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society , pp. 47-50
    • Irwin, K.1    Yu, T.2
  • 66
    • 84957805078 scopus 로고    scopus 로고
    • Platform for enterprise privacy practices: Privacy-enabled management of customer data
    • ISBN 3-540-00565-X
    • Günter Karjoth, Matthias Schunter, and Michael Waidner. Platform for enterprise privacy practices: Privacy-enabled management of customer data. In Privacy Enhancing Technologies, volume 2482 of LNCS, 2003. ISBN 3-540-00565-X.
    • (2003) Privacy Enhancing Technologies, volume 2482 of LNCS
    • Karjoth, G.1    Schunter, M.2    Waidner, M.3
  • 68
    • 70449462482 scopus 로고    scopus 로고
    • The keynote trust-management system, version 2
    • A. Keromytis. The keynote trust-management system, version 2. IETF RFC, 2704: 164-173, 1999.
    • (1999) IETF RFC , vol.2704 , pp. 164-173
    • Keromytis, A.1
  • 69
    • 55549095165 scopus 로고    scopus 로고
    • Building a privacy-preserving benchmarking enterprise system
    • ISSN 1751-7575
    • Florian Kerschbaum. Building a privacy-preserving benchmarking enterprise system. Enterp. Inf. Syst., 2(4):421-441, 2008. ISSN 1751-7575.
    • (2008) Enterp. Inf. Syst. , vol.2 , Issue.4 , pp. 421-441
    • Kerschbaum, F.1
  • 70
    • 35248894988 scopus 로고    scopus 로고
    • A component architecture for dynamically managing privacy constraints in personalized web-based systems
    • Dresden, Germany, March 26-28, 2003, Revised Papers, volume 2760 of LNCS, Springer
    • Alfred Kobsa. A component architecture for dynamically managing privacy constraints in personalized web-based systems. In Privacy Enhancing Technologies, Third In- ternational Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers, volume 2760 of LNCS, pages 177-188. Springer, 2003.
    • (2003) Privacy Enhancing Technologies, Third In- ternational Workshop, PET 2003 , pp. 177-188
    • Kobsa, A.1
  • 71
    • 0012128179 scopus 로고    scopus 로고
    • Http cookies: Standards, privacy, and politics
    • ISSN 1533-5399. doi
    • David M. Kristol. Http cookies: Standards, privacy, and politics. ACM Trans. Internet Technol., 1(2):151-198, 2001. ISSN 1533-5399. doi: http://doi.acm.org/10.1145/ 502152.502153.
    • (2001) ACM Trans. Internet Technol. , vol.1 , Issue.2 , pp. 151-198
    • Kristol, D.M.1
  • 72
    • 0036312325 scopus 로고    scopus 로고
    • Hordes: A multicast based protocol for anonymity
    • Brian Neil Levine and Clay Shields. Hordes: a multicast based protocol for anonymity. J. Comput. Secur., 10(3):213-240, 2002. ISSN 0926-227X. (Pubitemid 34814465)
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 213-240
    • Levine, B.N.1    Shields, C.2
  • 74
    • 84972513529 scopus 로고
    • The probability approach to the treatment of uncertainty in artificial intelligence and expert systems
    • Dennis V. Lindley. The probability approach to the treatment of uncertainty in artificial intelligence and expert systems. Statistical Science, 2(1):17-24, 1987.
    • (1987) Statistical Science , vol.2 , Issue.1 , pp. 17-24
    • Lindley, D.V.1
  • 75
    • 34548547007 scopus 로고    scopus 로고
    • Blocking anonymity threats raised by frequent itemset mining
    • November
    • F. Giannotti M. Atzori, F. Bonchi and D. Pedreschi. Blocking anonymity threats raised by frequent itemset mining. In ICDM '05, November 2005.
    • (2005) ICDM ' 05
    • Giannotti, F.1    Atzori, M.2    Bonchi, F.3    Pedreschi, D.4
  • 77
    • 24944502763 scopus 로고    scopus 로고
    • Privacy in data mining using formal methods
    • Typed Lambda Calculi and Applications: 7th International Conference, TLCA 2005, Proceedings
    • Stan Matwin, Amy P. Felty, István T. Hernádvölgyi, and Venanzio Capretta. Privacy in data mining using formal methods. In TLCA, pages 278-292, 2005. (Pubitemid 41312723)
    • (2005) Lecture Notes in Computer Science , vol.3461 , pp. 278-292
    • Matwin, S.1    Felty, A.2    Hernadvolgyi, I.3    Capretta, V.4
  • 81
    • 0035203778 scopus 로고    scopus 로고
    • A distributed system, adaptive to trust assessment, based on peer-to-peer e-records replication and storage
    • Washington, DC, USA, IEEE Computer Society
    • M. Mont and L. Tomasi. A distributed system, adaptive to trust assessment, based on peer-to-peer e-records replication and storage. In FTDCS '01: Proceedings of the 8th IEEE Workshop on Future Trends of Distributed Computing Systems, page 89, Washington, DC, USA, 2001. IEEE Computer Society.
    • (2001) FTDCS ' 01: Proceedings of the 8th IEEE Workshop on Future Trends of Distributed Computing Systems , pp. 89
    • Mont, M.1    Tomasi, L.2
  • 82
    • 31544459196 scopus 로고    scopus 로고
    • Handling privacy obligations in enterprises: Important aspects and technical approaches
    • Marco Casassa Mont. Handling privacy obligations in enterprises: important aspects and technical approaches. Comput. Syst. Sci. Eng., 20(6), 2005.
    • (2005) Comput. Syst. Sci. Eng. , vol.20 , Issue.6
    • Mont, M.C.1
  • 83
    • 26844431950 scopus 로고    scopus 로고
    • An adaptive privacy management system for data repositories
    • Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005. Proceedings
    • Marco Casassa Mont and Siani Pearson. An adaptive privacy management system for data repositories. In TrustBus, pages 236-245, 2005. (Pubitemid 41450301)
    • (2005) Lecture Notes in Computer Science , vol.3592 , pp. 236-245
    • Mont, M.C.1    Pearson, S.2
  • 84
    • 33645678639 scopus 로고    scopus 로고
    • Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
    • Marco Casassa Mont, Siani Pearson, and Pete Bramhall. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. Technical report, HP Laboratories Bristol, 2003.
    • (2003) Technical report HP Laboratories Bristol
    • Mont, M.C.1    Pearson, S.2    Bramhall, P.3
  • 85
    • 80051649427 scopus 로고    scopus 로고
    • The federal trade commission and the future development of u.s. consumer protection policy
    • Timothy J. Muris. The federal trade commission and the future development of u.s. consumer protection policy. George Mason Law & Economics Research Paper, 2004.
    • (2004) George Mason Law & Economics Research Paper
    • Muris, T.J.1
  • 86
    • 70349832810 scopus 로고    scopus 로고
    • How to break anonymity of the netflix prize dataset
    • Arvind Narayanan and Vitaly Shmatikov. How to break anonymity of the netflix prize dataset. CoRR, abs/cs/0610105, 2006.
    • (2006) CoRR, abs/cs/0610105
    • Narayanan, A.1    Shmatikov, V.2
  • 89
    • 70349333899 scopus 로고    scopus 로고
    • Privacy-aware role-based access control
    • ISSN 1540-7993. doi
    • Qun Ni, Elisa Bertino, Jorge Lobo, and Seraphin B. Calo. Privacy-aware role-based access control. IEEE Security and Privacy, 7(4):35-43, 2009. ISSN 1540-7993. doi:http://doi.ieeecomputersociety.org/10.1109/MSP.2009.102.
    • (2009) IEEE Security and Privacy , vol.7 , Issue.4 , pp. 35-43
    • Ni, Q.1    Bertino, E.2    Lobo, J.3    Calo, S.B.4
  • 91
    • 35248872156 scopus 로고    scopus 로고
    • From privacy legislation to interface design: Implementing information privacy in human-computer interactions
    • Springer
    • Andrew S. Patrick and Steve Kenny. From privacy legislation to interface design: Implementing information privacy in human-computer interactions. In Privacy Enhancing Technologies, volume 2760 of LNCS, pages 107-124. Springer, 2003.
    • (2003) Privacy Enhancing Technologies, volume 2760 of LNCS , pp. 107-124
    • Patrick, A.S.1    Kenny, S.2
  • 92
    • 24944506569 scopus 로고    scopus 로고
    • Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy
    • Trust Management: Third International Conference, iTrust 2005, Proceedings
    • Siani Pearson. Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy. In iTrust, pages 305-320, 2005. (Pubitemid 41313136)
    • (2005) Lecture Notes in Computer Science , vol.3477 , pp. 305-320
    • Pearson, S.1
  • 93
    • 71749088022 scopus 로고    scopus 로고
    • A privacy management tool for global outsourcing
    • Siani Pearson, Tomas Sander, and Rajneesh Sharma. A privacy management tool for global outsourcing. In DPM, 2009.
    • (2009) DPM
    • Pearson, S.1    Sander, T.2    Sharma, R.3
  • 94
    • 55549122324 scopus 로고    scopus 로고
    • Situation-based access control: Privacy management via modeling of patient data access scenarios
    • ISSN 1532-0464. doi
    • Mor Peleg, Dizza Beimel, Dov Dori, and Yaron Denekamp. Situation-based access control: Privacy management via modeling of patient data access scenarios. J. of Biomedical Informatics, 41(6):1028-1040, 2008. ISSN 1532-0464. doi: http://dx.doi. org/10.1016/j.jbi.2008.03.014.
    • (2008) J. of Biomedical Informatics , vol.41 , Issue.6 , pp. 1028-1040
    • Peleg, M.1    Beimel, D.2    Dori, D.3    Denekamp, Y.4
  • 96
    • 4544312695 scopus 로고    scopus 로고
    • Cryptographic techniques for privacy preserving data mining
    • B. Pinkas. Cryptographic techniques for privacy preserving data mining. SIGKDD Explorations, 4(2):12-19, 2002.
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 12-19
    • Pinkas, B.1
  • 97
    • 84925971879 scopus 로고
    • The economics of privacy
    • Richard A. Posner. The economics of privacy. American Economic Review, 71(2): 405-409, 1981.
    • (1981) American Economic Review , vol.71 , Issue.2 , pp. 405-409
    • Posner, R.A.1
  • 98
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for web transactions
    • ISSN 1094-9224
    • Michael K. Reiter and Aviel D. Rubin. Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur., 1(1):66-92, 1998. ISSN 1094-9224.
    • (1998) ACM Trans. Inf. Syst. Secur. , vol.1 , Issue.1 , pp. 66-92
    • Reiter, M.K.1    Rubin, A.D.2
  • 99
    • 0038041177 scopus 로고    scopus 로고
    • Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection
    • New York, NY, USA, ACM. ISBN 1-58113-633-1. doi
    • Marc Rennhard and Bernhard Plattner. Introducing morphmix: peer-to-peer based anonymous internet usage with collusion detection. In WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, pages 91-102, New York, NY, USA, 2002. ACM. ISBN 1-58113-633-1. doi: http://doi.acm.org/10.1145/ 644527.644537.
    • (2002) WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society , pp. 91-102
    • Rennhard, M.1    Plattner, B.2
  • 100
    • 38149129285 scopus 로고    scopus 로고
    • Enforcing p3p policies using a digital rights management system
    • Springer, ISBN 978-3-540-75550-0
    • Farzad Salim, Nicholas Paul Sheppard, and Reihaneh Safavi-Naini. Enforcing p3p policies using a digital rights management system. In Privacy Enhancing Technologies, volume 4776 of LNCS, pages 200-217. Springer, 2007. ISBN 978-3-540-75550-0.
    • (2007) Privacy Enhancing Technologies, volume 4776 of LNCS , pp. 200-217
    • Salim, F.1    Sheppard, N.P.2    Safavi-Naini, R.3
  • 102
    • 84957811521 scopus 로고    scopus 로고
    • Protecting Privacy during On-Line Trust Negotiation
    • Privacy Enhancing Technologies
    • Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, and Ryan Jarvis. Protecting privacy during on-line trust negotiation. In Privacy Enhancing Technologies, volume 2482 of LNCS, pages 129-143. Springer, 2003. ISBN 3-540-00565-X. (Pubitemid 36309884)
    • (2003) Lecture Notes in Computer Science , Issue.2482 , pp. 129-143
    • Seamons, K.E.1    Winslett, M.2    Yu, T.3    Yu, L.4    Jarvis, R.5
  • 103
    • 80051606788 scopus 로고    scopus 로고
    • Ns2: Networked searchable store with correctness
    • VLDB Endowment, ISBN 978-1-59593-649-3
    • Radu Sion, Sumeet Bajaj, Bogdan Carbunar, and Stefan Katzenbeisser. Ns2: networked searchable store with correctness. In VLDB '07, pages 1342-1345. VLDB Endowment, 2007. ISBN 978-1-59593-649-3.
    • (2007) VLDB ' 07 , pp. 1342-1345
    • Sion, R.1    Bajaj, S.2    Carbunar, B.3    Katzenbeisser, S.4
  • 104
    • 77952280061 scopus 로고    scopus 로고
    • Location privacy in location-based services: Beyond ttp-based schemes
    • Agusti Solanas, Josep Domingo-Ferrer, and Antoni Martínez- Ballesté. Location privacy in location-based services: Beyond ttp-based schemes. In PiLBA, 2008.
    • (2008) PiLBA
    • Solanas, A.1    Domingo-Ferrer, J.2    Martínez-Ballesté, A.3
  • 105
    • 70349689745 scopus 로고    scopus 로고
    • GWU Law School Public Law Research Paper No. 129
    • Daniel J. Solove. A Taxonomy of Privacy. GWU Law School Public Law Research Paper No. 129, 2006.
    • (2006) A Taxonomy of Privacy
    • Solove, D.J.1
  • 106
    • 60449120378 scopus 로고    scopus 로고
    • Lorrie Faith Cranor. Engineering privacy
    • ISSN 0098-5589. doi
    • Sarah Spiekermann and Lorrie Faith Cranor. Engineering privacy. IEEE Trans. Softw. Eng., 35(1):67-82, 2009. ISSN 0098-5589. doi: http://dx.doi.org/ 10.1109/TSE.2008. 88.
    • (2009) IEEE Trans. Softw. Eng. , vol.35 , Issue.1 , pp. 67-82
    • Spiekermann, S.1
  • 107
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: A model for protecting privacy
    • DOI 10.1142/S0218488502001648
    • Latanya Sweeney. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):557-570, 2002. ISSN 0218-4885. doi: http: //dx.doi.org/10.1142/S0218488502001648. (Pubitemid 35384857)
    • (2002) International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 108
    • 80051608849 scopus 로고    scopus 로고
    • Privacy and information acquisition in competitive markets
    • Working Paper Series 1165, Berkeley Olin Program in Law & Economics, May
    • Curt Taylor. Privacy and information acquisition in competitive markets. Berkeley Olin Program in Law & Economics, Working Paper Series 1165, Berkeley Olin Program in Law & Economics, May 2004a.
    • (2004) Berkeley Olin Program in Law & Economics
    • Taylor, C.1
  • 109
    • 14744272901 scopus 로고    scopus 로고
    • Consumer privacy and the market for customer information
    • Winter
    • Curtis R. Taylor. Consumer privacy and the market for customer information. RAND Journal of Economics, 35(4):631-650, Winter 2004b.
    • (2004) RAND Journal of Economics , vol.35 , Issue.4 , pp. 631-650
    • Taylor, C.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.