-
1
-
-
84957795309
-
Private Authentication
-
Privacy Enhancing Technologies
-
Martín Abadi. Private authentication. In Privacy Enhancing Technologies, volume 2482 of LNCS, pages 27-40, 2003. ISBN 3-540-00565-X. (Pubitemid 36309877)
-
(2003)
Lecture Notes in Computer Science
, Issue.2482
, pp. 27-40
-
-
Abadi, M.1
-
2
-
-
14744280530
-
Conditioning prices on purchase history
-
DOI 10.1287/mksc.1040.0103
-
Alessandro Acquisti and Hal R. Varian. Conditioning prices on purchase history. Marketing Science, 24:367-381, 2005. (Pubitemid 41409331)
-
(2005)
Marketing Science
, vol.24
, Issue.3
, pp. 367-381
-
-
Acquisti, A.1
Varian, H.R.2
-
3
-
-
0041783510
-
Privacy-preserving data mining
-
ACM Press, May, ISBN 1-581-13218-2
-
Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. In Proc. of the ACM SIGMOD, pages 439-450. ACM Press, May 2000. ISBN 1-581-13218-2.
-
(2000)
Proc. of the ACM SIGMOD
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
0242674432
-
Hippocratic databases
-
Morgan Kaufmann
-
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Hippocratic databases. In VLDB, pages 143-154. Morgan Kaufmann, 2002.
-
(2002)
VLDB
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
5
-
-
1642295996
-
Privacy Enhancing Service Architectures
-
Privacy Enhancing Technologies
-
Tero Alamäki, Margareta Björksten, Péter Dornbach, Casper Gripenberg, Norbert Gyorb író, Gábor Márton, Zoltán Németh, Timo Skyttä, and Mikko Tarkiainen. Privacy enhancing service architectures. In Privacy Enhancing Technologies, volume 2482 of LNCS, pages 99-109. Springer, 2003. ISBN 3-540-00565-X. (Pubitemid 36309882)
-
(2003)
Lecture Notes in Computer Science
, Issue.2482
, pp. 99-109
-
-
Alamaki, T.1
Bjorksten, M.2
Dornbach, P.3
Gripenberg, C.4
Gyorbiro, N.5
Marton, G.6
Nemeth, Z.7
Skytta, T.8
Tarkiainen, M.9
-
6
-
-
84957801565
-
Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education
-
Privacy Enhancing Technologies
-
Adil Alsaid and David Martin. Detecting web bugs with bugnosis: Privacy advocacy through education. In Privacy Enhancing Technologies, volume 2482 of Lecture Notes in Computer Science, pages 13-26. Springer, 2003. (Pubitemid 36309876)
-
(2003)
Lecture Notes in Computer Science
, Issue.2482
, pp. 13-26
-
-
Alsaid, A.1
Martin, D.2
-
7
-
-
33846981890
-
Trust in prime
-
C. Andersson, J. Camenisch, S. Crane, S. Fischer-Hubner, R. Leenes, S. Pearsorr, J. S. Pettersson, and D. Sommer. Trust in prime. In Signal Processing and Information Technology, pages 552-559, 2005.
-
(2005)
Signal Processing and Information Technology
, pp. 552-559
-
-
Andersson, C.1
Camenisch, J.2
Crane, S.3
Fischer-Hubner, S.4
Leenes, R.5
Pearsorr, S.6
Pettersson, J.S.7
Sommer, D.8
-
8
-
-
33746682538
-
Enhancing user privacy through data handling policies
-
DOI 10.1007/11805588-16, Data and Applications Security XX - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Proceedings
-
Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, and Pierangela Samarati. Enhancing user privacy through data handling policies. In 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, volume 4127 of Lecture Notes in Computer Science, pages 224-236, 2006. ISBN 3-540-36796-9. (Pubitemid 44165890)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4127
, pp. 224-236
-
-
Ardagna, C.A.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
9
-
-
35248893400
-
Privacy enhancing technologies: A review
-
John Argyrakis, Stefanos Gritzalis, and Chris Kioulafas. Privacy enhancing technologies: A review. In EGOV, pages 282-287, 2003.
-
(2003)
EGOV
, pp. 282-287
-
-
Argyrakis, J.1
Gritzalis, S.2
Kioulafas, C.3
-
10
-
-
84902506864
-
Privacy issues in RFID banknote protection schemes
-
Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, and Anas Abou El Kadam, editors, Toulouse, France, August, IFIP
-
Gildas Avoine. Privacy issues in RFID banknote protection schemes. In Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, and Anas Abou El Kadam, editors, International Conference on Smart Card Research and Advanced Applications - CARDIS, pages 33-48, Toulouse, France, August 2004. IFIP.
-
(2004)
International Conference on Smart Card Research and Advanced Applications - CARDIS
, pp. 33-48
-
-
Avoine, G.1
-
11
-
-
77049125775
-
Privacy injector - Automated privacy enforcement through aspects
-
Springer, ISBN 3-540-68790-4
-
Chris Vanden Berghe and Matthias Schunter. Privacy injector - automated privacy enforcement through aspects. In Privacy Enhancing Technologies, volume 4258 of LNCS, pages 99-117. Springer, 2006. ISBN 3-540-68790-4.
-
(2006)
Privacy Enhancing Technologies, volume 4258 of LNCS
, pp. 99-117
-
-
Berghe, C.V.1
Schunter, M.2
-
12
-
-
78049352261
-
Exploring the feasibility of a spatial user interface paradigm for privacy-enhancing technologys
-
Springer Verlag
-
Mike Bergmann, Martin Rost, and John Sren Pettersson. Exploring the feasibility of a spatial user interface paradigm for privacy-enhancing technologys. In ISD '05, pages 437-448. Springer Verlag, 2005.
-
(2005)
ISD '05
, pp. 437-448
-
-
Bergmann, M.1
Rost, M.2
Pettersson, J.S.3
-
13
-
-
85001786260
-
Secure and selective dissemination of xml documents
-
ISSN 1094-9224
-
Elisa Bertino and Elena Ferrari. Secure and selective dissemination of xml documents. ACM Trans. Inf. Syst. Secur., 5(3):290-331, 2002. ISSN 1094-9224.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.3
, pp. 290-331
-
-
Bertino, E.1
Ferrari, E.2
-
16
-
-
17044362511
-
-
Discussion Papers 1394, Northwestern University, Center for Mathematical Studies in Economics and Management Science, July
-
Giacomo Calzolari and Alessandro Pavan. On the optimality of privacy in sequential contracting. Discussion Papers 1394, Northwestern University, Center for Mathematical Studies in Economics and Management Science, July 2004.
-
(2004)
On the Optimality of Privacy in Sequential Contracting
-
-
Calzolari, G.1
Pavan, A.2
-
18
-
-
48049100992
-
Query privacy in wireless sensor networks
-
Bogdan Carbunar, Yang Yu,Weidong Shi, Michael Pearce, and Venu Vasudevan. Query privacy in wireless sensor networks. In SECON, pages 203-212, 2007.
-
(2007)
SECON
, pp. 203-212
-
-
Carbunar, B.1
Yu, Y.2
Shi, W.3
Pearce, M.4
Vasudevan, V.5
-
20
-
-
70450255117
-
A semantic web based framework for social network access control
-
New York, NY, USA, ACM. ISBN 978-1-60558-537-6. doi
-
Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, and Bhavani Thuraisingham. A semantic web based framework for social network access control. In SACMAT '09, pages 177-186, New York, NY, USA, 2009. ACM. ISBN 978-1-60558-537-6. doi: http://doi.acm.org/10.1145/1542207.1542237.
-
(2009)
SACMAT '09
, pp. 177-186
-
-
Carminati, B.1
Ferrari, E.2
Heatherly, R.3
Kantarcioglu, M.4
Thuraisingham, B.5
-
21
-
-
0004055363
-
Showing credentials without identification. signatures transferred between unconditionally unlinkable pseudonyms
-
New York, NY, USA, Springer-Verlag New York, Inc. ISBN 0-387-16468-5
-
D Chaum. Showing credentials without identification. signatures transferred between unconditionally unlinkable pseudonyms. In EUROCRYPT '85, pages 241-244, New York, NY, USA, 1986. Springer-Verlag New York, Inc. ISBN 0-387-16468-5.
-
(1986)
EUROCRYPT '85
, pp. 241-244
-
-
Chaum, D.1
-
22
-
-
0027005999
-
Achieving electronic privacy
-
David Chaum. Achieving electronic privacy. Scientific American, pages 91-101, 1992.
-
(1992)
Scientific American
, pp. 91-101
-
-
Chaum, D.1
-
23
-
-
33750283449
-
Privacy preserving data classification with rotation perturbation
-
DOI 10.1109/ICDM.2005.121, 1565733, Proceedings - Fifth IEEE International Conference on Data Mining, ICDM 2005
-
K. Chen and L. Liu. Privacy preserving data classification with rotation perturbation. In ICDM '05, pages 589-592, Houston, TX, November 2005. (Pubitemid 47385747)
-
(2005)
Proceedings - IEEE International Conference on Data Mining, ICDM
, pp. 589-592
-
-
Chen, K.1
Liu, L.2
-
24
-
-
0001470602
-
Referee: Trust management for web applications
-
Yang-Hua Chu, Joan Feigenbaum, Brian A. LaMacchia, Paul Resnick, and Martin Strauss. Referee: Trust management for web applications. Computer Networks, 29 (8-13):953-964, 1997.
-
(1997)
Computer Networks
, vol.29
, Issue.8-13
, pp. 953-964
-
-
Chu, Y.-H.1
Feigenbaum, J.2
LaMacchia, B.A.3
Resnick, P.4
Strauss, M.5
-
25
-
-
50049116165
-
A customizable reputation-based privacy assurance system using active feedback
-
Stephen Crane and Marco Casassa Mont. A customizable reputation-based privacy assurance system using active feedback. In Securecomm and Workshops, 2006, pages 1-8, 2006.
-
(2006)
Securecomm and Workshops, 2006
, pp. 1-8
-
-
Crane, S.1
Mont, M.C.2
-
26
-
-
33749617824
-
User interfaces for privacy agents
-
DOI 10.1145/1165734.1165735
-
Lorrie Faith Cranor, Praveen Guduru, and Manjula Arjula. User interfaces for privacy agents. ACM Trans. Comput.-Hum. Interact., 13(2):135-178, 2006. ISSN 1073-0516. doi: http://doi.acm.org/10.1145/1165734.1165735. (Pubitemid 44546465)
-
(2006)
ACM Transactions on Computer-Human Interaction
, vol.13
, Issue.2
, pp. 135-178
-
-
Cranor, L.F.1
Guduru, P.2
Arjula, M.3
-
27
-
-
52949087952
-
A robust sampling-based framework for privacy preserving olap
-
Berlin, Heidelberg, Springer-Verlag. ISBN 978-3-540-85835-5
-
Alfredo Cuzzocrea, Vincenzo Russo, and Domenico Saccà. A robust sampling-based framework for privacy preserving olap. In DaWaK '08, pages 97-114, Berlin, Heidelberg, 2008. Springer-Verlag. ISBN 978-3-540-85835-5.
-
(2008)
DaWaK ' 08
, pp. 97-114
-
-
Cuzzocrea, A.1
Russo, V.2
Saccà, D.3
-
28
-
-
84944048132
-
The Ponder Policy Specification Language
-
Policies for Distributed Systems and Networks
-
Nicodemos Damianou, Naranker Dulay, Emil Lupu, and Nicodemos Damianou Naranker Dulay. The ponder policy specification language. In Lecture Notes in Computer Science, pages 18-38. Springer-Verlag, 2001. (Pubitemid 33225338)
-
(2001)
Lecture Notes in Computer Science
, Issue.1995
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
29
-
-
74049129119
-
The economics of mass surveillance - and the questionable value of anonymous communications
-
George Danezis and Bettina Wittneben. The economics of mass surveillance - and the questionable value of anonymous communications. In WEIS 2006, 2006.
-
(2006)
WEIS 2006
-
-
Danezis, G.1
Wittneben, B.2
-
30
-
-
49049105883
-
Access control policies and languages
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, and P. Samarati. Access control policies and languages. IJCSE, 3(2), 2007.
-
(2007)
IJCSE
, vol.3
, Issue.2
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Samarati, P.4
-
31
-
-
80051615593
-
A Passive Attack on the Privacy of Web Users Using Standard Log Information
-
Privacy Enhancing Technologies
-
Thomas Demuth. A passive attack on the privacy of web users using standard log information. In Privacy Enhancing Technologies, volume 2482 of LNCS, pages 179- 193. Springer, 2003. ISBN 3-540-00565-X. (Pubitemid 36309888)
-
(2003)
Lecture Notes in Computer Science
, Issue.2482
, pp. 179-193
-
-
Demuth, T.1
-
33
-
-
33645240198
-
The Free Haven Project: Distributed Anonymous Storage Service
-
Designing Privacy Enhancing Technologies
-
Roger Dingledine, Michael J. Freedman, and David Molnar. The free haven project: Distributed anonymous storage service. In In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, pages 67-95, 2000. (Pubitemid 33241788)
-
(2001)
Lecture Notes in Computer Science
, Issue.2009
, pp. 67-95
-
-
Dingledine, R.1
Freedman, M.J.2
Molnar, D.3
-
34
-
-
85084161366
-
Tor: The second-generation onion router
-
San Diego, CA, USA, August
-
Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, pages 303-320, San Diego, CA, USA, August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
36
-
-
38049048780
-
A three-dimensional conceptual framework for database privacy
-
Josep Domingo-Ferrer. A three-dimensional conceptual framework for database privacy. In Secure Data Management, pages 193-202, 2007.
-
(2007)
Secure Data Management
, pp. 193-202
-
-
Domingo-Ferrer, J.1
-
37
-
-
63749113337
-
Location privacy via unlinkability: An alternative to cloaking and perturbation
-
Josep Domingo-Ferrer. Location privacy via unlinkability: an alternative to cloaking and perturbation. In PAIS, pages 1-2, 2008.
-
(2008)
PAIS
, pp. 1-2
-
-
Domingo-Ferrer, J.1
-
39
-
-
33645584057
-
Privacy-preserving multivariate statistical analysis: Linear regression and classification
-
Lake Buena Vista, FL, April
-
W. Du, Y. S. Han, and S. Chen. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In SDM '04, Lake Buena Vista, FL, April 2004.
-
(2004)
SDM ' 04
-
-
Du, W.1
Han, Y.S.2
Chen, S.3
-
42
-
-
80051602326
-
-
European Union EU. Press release: Privacy enhancing technologies (pets)
-
European Union EU. Press release: Privacy enhancing technologies (pets), 2007. http: //europa.eu/rapid/pressReleasesAction.do?reference=MEMO/07/ 159&format= HTML&aged=0&language=EN&guiLanguage=en.%20Reference: %20MEMO/07/159.
-
(2007)
-
-
-
43
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
San Diego, CA, June
-
A. Evfimevski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In Proceedings of the ACM SIGMOD/PODS Conference, pages 211-222, San Diego, CA, June 2003.
-
(2003)
Proceedings of the ACM SIGMOD/PODS Conference
, pp. 211-222
-
-
Evfimevski, A.1
Gehrke, J.2
Srikant, R.3
-
44
-
-
80051617201
-
Pseudonymizing Unix, and Log Files. Pseudonymizing unix log files
-
Ulrich Flegel, Pseudonymizing Unix, and Log Files. Pseudonymizing unix log files. In Infrastructure Security, 2002.
-
(2002)
Infrastructure Security
-
-
Flegel, U.1
-
45
-
-
84910595881
-
Introducing tarzan, a peer-to-peer anonymizing network layer
-
London, UK, Springer-Verlag. ISBN 3-540-44179-4
-
Michael J. Freedman, Emil Sit, Josh Cates, and Robert Morris. Introducing tarzan, a peer-to-peer anonymizing network layer. In IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pages 121-129, London, UK, 2002. Springer-Verlag. ISBN 3-540-44179-4.
-
(2002)
IPTPS ' 01: Revised Papers from the First International Workshop on Peer-to-Peer Systems
, pp. 121-129
-
-
Freedman, M.J.1
Sit, E.2
Cates, J.3
Morris, R.4
-
46
-
-
34047165799
-
Anonymizing classification data for privacy preservation
-
DOI 10.1109/TKDE.2007.1015
-
B. C. M. Fung, Ke Wang, and P. S. Yu. Anonymizing classification data for privacy preservation. TKDE, 19(5):711-725, May 2007. (Pubitemid 46509408)
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.5
, pp. 711-725
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
48
-
-
70350755795
-
Enhancing privacy in identity management systems
-
New York, NY, USA, ACM, ISBN 978-1-59593-883-1. doi
-
Steven Gevers, Verslype Verslype, and Bart De Decker. Enhancing privacy in identity management systems. In WPES '07, pages 60-63, New York, NY, USA, 2007. ACM. ISBN 978-1-59593-883-1. doi: http://doi.acm.org/10.1145/1314333. 1314344.
-
(2007)
WPES ' 07
, pp. 60-63
-
-
Gevers, S.1
Verslype, V.2
De Decker, B.3
-
49
-
-
48649106873
-
Privacy-preserving data mining on moving object trajectories
-
Gyözö Gidófalvi, Xuegang Huang, and Torben Bach Pedersen. Privacy-preserving data mining on moving object trajectories. In MDM, pages 60-68, 2007.
-
(2007)
MDM
, pp. 60-68
-
-
Gidófalvi, G.1
Huang, X.2
Pedersen, T.B.3
-
50
-
-
40249092538
-
Privacy-enhancing technologies for the internet, ii: Five years later
-
Ian Goldberg. Privacy-enhancing technologies for the internet, ii: Five years later. In Privacy Enhancing Technologies, pages 1-12, 2002.
-
(2002)
Privacy Enhancing Technologies
, pp. 1-12
-
-
Goldberg, I.1
-
55
-
-
34249711260
-
Examining the content and privacy of web browsing incidental information
-
DOI 10.1145/1135777.1135801, Proceedings of the 15th International Conference on World Wide Web
-
Kirstie Hawkey and Kori M. Inkpen. Examining the content and privacy of web browsing incidental information. In WWW '06, pages 123-132, New York, NY, USA, 2006. ACM. ISBN 1-59593-323-9. doi: http://doi.acm.org/10.1145/1135777. 1135801. (Pubitemid 46946604)
-
(2006)
Proceedings of the 15th International Conference on World Wide Web
, pp. 123-132
-
-
Hawkey, K.1
Inkpen, K.M.2
-
56
-
-
33747736210
-
Privacy, property rights and efficiency: The economics of privacy as secrecy
-
DOI 10.1007/s11129-005-9004-7
-
Benjamin Hermalin and Michael Katz. Privacy, property rights and efficiency: The economics of privacy as secrecy. Quantitative Marketing and Economics, 4(3):209-239, September 2006. (Pubitemid 44269788)
-
(2006)
Quantitative Marketing and Economics
, vol.4
, Issue.3
, pp. 209-239
-
-
Hermalin, B.E.1
Katz, M.L.2
-
57
-
-
41549150768
-
Relying party credentials framework
-
ISSN 1389-5753
-
Amir Herzberg and Yosi Mass. Relying party credentials framework. Electronic Commerce Research, 4(1-2):23-39, 2004a. ISSN 1389-5753
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.1-2
, pp. 23-39
-
-
Herzberg, A.1
Mass, Y.2
-
58
-
-
41549150768
-
Relying party credentials framework
-
Amir Herzberg and Yosi Mass. Relying party credentials framework. Electronic Commerce Research, 4(1-2):23-39, 2004b.
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.1-2
, pp. 23-39
-
-
Herzberg, A.1
Mass, Y.2
-
59
-
-
78650319841
-
-
Now Publishers Inc., Hanover, MA, USA, ISBN 1601980760,9781601980762
-
Giovanni Iachello and Jason Hong. End-User Privacy in Human-Computer Interaction. Now Publishers Inc., Hanover, MA, USA, 2007. ISBN 1601980760, 9781601980762.
-
(2007)
End-User Privacy in Human-Computer Interaction
-
-
Iachello, G.1
Hong, J.2
-
60
-
-
80051619795
-
-
Information Commissioner's Office UK ICO
-
Information Commissioner's Office UK ICO. Data protection guidance note: Privacy enhancing technologies, 2007. http://www.ico.gov.uk/upload/documents/ library/data-protection/detailed-specialist-guides/privacy-enhancing- technologies-v2.pdf.
-
(2007)
Data Protection Guidance Note: Privacy Enhancing Technologies
-
-
-
62
-
-
33749039193
-
Determining user privacy preferences by asking the right questions: An automated approach
-
WPES'05: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
-
Keith Irwin and Ting Yu. Determining user privacy preferences by asking the right questions: an automated approach. In WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pages 47-50, New York, NY, USA, 2005. ACM. ISBN 1-59593-228-3. doi: http://doi.acm.org/10.1145/1102199. 1102209. (Pubitemid 44447417)
-
(2005)
WPES'05: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
, pp. 47-50
-
-
Irwin, K.1
Yu, T.2
-
63
-
-
34250634485
-
Protecting browser state from web privacy attacks
-
DOI 10.1145/1135777.1135884, Proceedings of the 15th International Conference on World Wide Web
-
Collin Jackson, Andrew Bortz, Dan Boneh, and John C. Mitchell. Protecting browser state from web privacy attacks. In WWW '06, pages 737-744, New York, NY, USA, 2006. ACM. ISBN 1-59593-323-9. (Pubitemid 46946665)
-
(2006)
Proceedings of the 15th International Conference on World Wide Web
, pp. 737-744
-
-
Jackson, C.1
Bortz, A.2
Boneh, D.3
Mitchell, J.C.4
-
64
-
-
38949106186
-
Sequence mining without sequences: A new way for privacy preserving
-
DOI 10.1109/ICTAI.2006.103, 4031918, Procedings - 18th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2006
-
Stephanie Jacquemont, Francois Jacquenet, and Marc Sebban. Sequence mining without sequences: A new way for privacy preserving. In ICTAI '06, pages 347-354. IEEE Computer Society, 2006. ISBN 0-7695-2728-0. (Pubitemid 351209540)
-
(2006)
Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI
, pp. 347-354
-
-
Jacquemont, S.1
Jacquenet, F.2
Sebban, M.3
-
65
-
-
35248892395
-
Privacy sensitive distributed data mining from multi-party data
-
Tucson, AZ, June, Springer Berlin/Heidelberg
-
Hillol Kargupta, Kun Liu, and Jessica Ryan. Privacy sensitive distributed data mining from multi-party data. In Proceedings of the first NSF/NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science, pages 336-342, Tucson, AZ, June 2003. Springer Berlin/Heidelberg.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics, Lecture Notes in Computer Science
, pp. 336-342
-
-
Kargupta, H.1
Liu, K.2
Ryan, J.3
-
66
-
-
84957805078
-
Platform for enterprise privacy practices: Privacy-enabled management of customer data
-
ISBN 3-540-00565-X
-
Günter Karjoth, Matthias Schunter, and Michael Waidner. Platform for enterprise privacy practices: Privacy-enabled management of customer data. In Privacy Enhancing Technologies, volume 2482 of LNCS, 2003. ISBN 3-540-00565-X.
-
(2003)
Privacy Enhancing Technologies, volume 2482 of LNCS
-
-
Karjoth, G.1
Schunter, M.2
Waidner, M.3
-
67
-
-
70350731253
-
A "nutrition label" for privacy
-
New York, NY, USA, ACM. ISBN 978-1-60558-736-3
-
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W. Reeder. A "nutrition label" for privacy. In SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security, pages 1-12, New York, NY, USA, 2009. ACM. ISBN 978-1-60558-736-3.
-
(2009)
SOUPS ' 09: Proceedings of the 5th Symposium on Usable Privacy and Security
, pp. 1-12
-
-
Kelley, P.G.1
Bresee, J.2
Cranor, L.F.3
Reeder, R.W.4
-
68
-
-
70449462482
-
The keynote trust-management system, version 2
-
A. Keromytis. The keynote trust-management system, version 2. IETF RFC, 2704: 164-173, 1999.
-
(1999)
IETF RFC
, vol.2704
, pp. 164-173
-
-
Keromytis, A.1
-
69
-
-
55549095165
-
Building a privacy-preserving benchmarking enterprise system
-
ISSN 1751-7575
-
Florian Kerschbaum. Building a privacy-preserving benchmarking enterprise system. Enterp. Inf. Syst., 2(4):421-441, 2008. ISSN 1751-7575.
-
(2008)
Enterp. Inf. Syst.
, vol.2
, Issue.4
, pp. 421-441
-
-
Kerschbaum, F.1
-
70
-
-
35248894988
-
A component architecture for dynamically managing privacy constraints in personalized web-based systems
-
Dresden, Germany, March 26-28, 2003, Revised Papers, volume 2760 of LNCS, Springer
-
Alfred Kobsa. A component architecture for dynamically managing privacy constraints in personalized web-based systems. In Privacy Enhancing Technologies, Third In- ternational Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers, volume 2760 of LNCS, pages 177-188. Springer, 2003.
-
(2003)
Privacy Enhancing Technologies, Third In- ternational Workshop, PET 2003
, pp. 177-188
-
-
Kobsa, A.1
-
71
-
-
0012128179
-
Http cookies: Standards, privacy, and politics
-
ISSN 1533-5399. doi
-
David M. Kristol. Http cookies: Standards, privacy, and politics. ACM Trans. Internet Technol., 1(2):151-198, 2001. ISSN 1533-5399. doi: http://doi.acm.org/10.1145/ 502152.502153.
-
(2001)
ACM Trans. Internet Technol.
, vol.1
, Issue.2
, pp. 151-198
-
-
Kristol, D.M.1
-
72
-
-
0036312325
-
Hordes: A multicast based protocol for anonymity
-
Brian Neil Levine and Clay Shields. Hordes: a multicast based protocol for anonymity. J. Comput. Secur., 10(3):213-240, 2002. ISSN 0926-227X. (Pubitemid 34814465)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 213-240
-
-
Levine, B.N.1
Shields, C.2
-
74
-
-
84972513529
-
The probability approach to the treatment of uncertainty in artificial intelligence and expert systems
-
Dennis V. Lindley. The probability approach to the treatment of uncertainty in artificial intelligence and expert systems. Statistical Science, 2(1):17-24, 1987.
-
(1987)
Statistical Science
, vol.2
, Issue.1
, pp. 17-24
-
-
Lindley, D.V.1
-
77
-
-
24944502763
-
Privacy in data mining using formal methods
-
Typed Lambda Calculi and Applications: 7th International Conference, TLCA 2005, Proceedings
-
Stan Matwin, Amy P. Felty, István T. Hernádvölgyi, and Venanzio Capretta. Privacy in data mining using formal methods. In TLCA, pages 278-292, 2005. (Pubitemid 41312723)
-
(2005)
Lecture Notes in Computer Science
, vol.3461
, pp. 278-292
-
-
Matwin, S.1
Felty, A.2
Hernadvolgyi, I.3
Capretta, V.4
-
81
-
-
0035203778
-
A distributed system, adaptive to trust assessment, based on peer-to-peer e-records replication and storage
-
Washington, DC, USA, IEEE Computer Society
-
M. Mont and L. Tomasi. A distributed system, adaptive to trust assessment, based on peer-to-peer e-records replication and storage. In FTDCS '01: Proceedings of the 8th IEEE Workshop on Future Trends of Distributed Computing Systems, page 89, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
FTDCS ' 01: Proceedings of the 8th IEEE Workshop on Future Trends of Distributed Computing Systems
, pp. 89
-
-
Mont, M.1
Tomasi, L.2
-
82
-
-
31544459196
-
Handling privacy obligations in enterprises: Important aspects and technical approaches
-
Marco Casassa Mont. Handling privacy obligations in enterprises: important aspects and technical approaches. Comput. Syst. Sci. Eng., 20(6), 2005.
-
(2005)
Comput. Syst. Sci. Eng.
, vol.20
, Issue.6
-
-
Mont, M.C.1
-
83
-
-
26844431950
-
An adaptive privacy management system for data repositories
-
Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005. Proceedings
-
Marco Casassa Mont and Siani Pearson. An adaptive privacy management system for data repositories. In TrustBus, pages 236-245, 2005. (Pubitemid 41450301)
-
(2005)
Lecture Notes in Computer Science
, vol.3592
, pp. 236-245
-
-
Mont, M.C.1
Pearson, S.2
-
84
-
-
33645678639
-
Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
-
Marco Casassa Mont, Siani Pearson, and Pete Bramhall. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. Technical report, HP Laboratories Bristol, 2003.
-
(2003)
Technical report HP Laboratories Bristol
-
-
Mont, M.C.1
Pearson, S.2
Bramhall, P.3
-
85
-
-
80051649427
-
The federal trade commission and the future development of u.s. consumer protection policy
-
Timothy J. Muris. The federal trade commission and the future development of u.s. consumer protection policy. George Mason Law & Economics Research Paper, 2004.
-
(2004)
George Mason Law & Economics Research Paper
-
-
Muris, T.J.1
-
86
-
-
70349832810
-
How to break anonymity of the netflix prize dataset
-
Arvind Narayanan and Vitaly Shmatikov. How to break anonymity of the netflix prize dataset. CoRR, abs/cs/0610105, 2006.
-
(2006)
CoRR, abs/cs/0610105
-
-
Narayanan, A.1
Shmatikov, V.2
-
89
-
-
70349333899
-
Privacy-aware role-based access control
-
ISSN 1540-7993. doi
-
Qun Ni, Elisa Bertino, Jorge Lobo, and Seraphin B. Calo. Privacy-aware role-based access control. IEEE Security and Privacy, 7(4):35-43, 2009. ISSN 1540-7993. doi:http://doi.ieeecomputersociety.org/10.1109/MSP.2009.102.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.4
, pp. 35-43
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
Calo, S.B.4
-
91
-
-
35248872156
-
From privacy legislation to interface design: Implementing information privacy in human-computer interactions
-
Springer
-
Andrew S. Patrick and Steve Kenny. From privacy legislation to interface design: Implementing information privacy in human-computer interactions. In Privacy Enhancing Technologies, volume 2760 of LNCS, pages 107-124. Springer, 2003.
-
(2003)
Privacy Enhancing Technologies, volume 2760 of LNCS
, pp. 107-124
-
-
Patrick, A.S.1
Kenny, S.2
-
92
-
-
24944506569
-
Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy
-
Trust Management: Third International Conference, iTrust 2005, Proceedings
-
Siani Pearson. Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy. In iTrust, pages 305-320, 2005. (Pubitemid 41313136)
-
(2005)
Lecture Notes in Computer Science
, vol.3477
, pp. 305-320
-
-
Pearson, S.1
-
93
-
-
71749088022
-
A privacy management tool for global outsourcing
-
Siani Pearson, Tomas Sander, and Rajneesh Sharma. A privacy management tool for global outsourcing. In DPM, 2009.
-
(2009)
DPM
-
-
Pearson, S.1
Sander, T.2
Sharma, R.3
-
94
-
-
55549122324
-
Situation-based access control: Privacy management via modeling of patient data access scenarios
-
ISSN 1532-0464. doi
-
Mor Peleg, Dizza Beimel, Dov Dori, and Yaron Denekamp. Situation-based access control: Privacy management via modeling of patient data access scenarios. J. of Biomedical Informatics, 41(6):1028-1040, 2008. ISSN 1532-0464. doi: http://dx.doi. org/10.1016/j.jbi.2008.03.014.
-
(2008)
J. of Biomedical Informatics
, vol.41
, Issue.6
, pp. 1028-1040
-
-
Peleg, M.1
Beimel, D.2
Dori, D.3
Denekamp, Y.4
-
95
-
-
77953796465
-
Making prime usable
-
New York, NY, USA, ACM. ISBN 1-59593-178-3. doi
-
John Sören Pettersson, Simone Fischer-Hübner, Ninni Danielsson, Jenny Nilsson, Mike Bergmann, Sebastian Clauss, Thomas Kriegelstein, and Henry Krasemann. Making prime usable. In SOUPS '05, pages 53-64, New York, NY, USA, 2005. ACM. ISBN 1-59593-178-3. doi: http://doi.acm.org/10.1145/1073001.1073007.
-
(2005)
SOUPS ' 05
, pp. 53-64
-
-
Pettersson, J.S.1
Fischer-Hübner, S.2
Danielsson, N.3
Nilsson, J.4
Bergmann, M.5
Clauss, S.6
Kriegelstein, T.7
Krasemann, H.8
-
96
-
-
4544312695
-
Cryptographic techniques for privacy preserving data mining
-
B. Pinkas. Cryptographic techniques for privacy preserving data mining. SIGKDD Explorations, 4(2):12-19, 2002.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 12-19
-
-
Pinkas, B.1
-
97
-
-
84925971879
-
The economics of privacy
-
Richard A. Posner. The economics of privacy. American Economic Review, 71(2): 405-409, 1981.
-
(1981)
American Economic Review
, vol.71
, Issue.2
, pp. 405-409
-
-
Posner, R.A.1
-
98
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
ISSN 1094-9224
-
Michael K. Reiter and Aviel D. Rubin. Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur., 1(1):66-92, 1998. ISSN 1094-9224.
-
(1998)
ACM Trans. Inf. Syst. Secur.
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
99
-
-
0038041177
-
Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection
-
New York, NY, USA, ACM. ISBN 1-58113-633-1. doi
-
Marc Rennhard and Bernhard Plattner. Introducing morphmix: peer-to-peer based anonymous internet usage with collusion detection. In WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, pages 91-102, New York, NY, USA, 2002. ACM. ISBN 1-58113-633-1. doi: http://doi.acm.org/10.1145/ 644527.644537.
-
(2002)
WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
, pp. 91-102
-
-
Rennhard, M.1
Plattner, B.2
-
100
-
-
38149129285
-
Enforcing p3p policies using a digital rights management system
-
Springer, ISBN 978-3-540-75550-0
-
Farzad Salim, Nicholas Paul Sheppard, and Reihaneh Safavi-Naini. Enforcing p3p policies using a digital rights management system. In Privacy Enhancing Technologies, volume 4776 of LNCS, pages 200-217. Springer, 2007. ISBN 978-3-540-75550-0.
-
(2007)
Privacy Enhancing Technologies, volume 4776 of LNCS
, pp. 200-217
-
-
Salim, F.1
Sheppard, N.P.2
Safavi-Naini, R.3
-
101
-
-
38349006925
-
Simplified privacy controls for aggregated services - suspend and resume of personal data
-
Springer
-
Matthias Schunter and Michael Waidner. Simplified privacy controls for aggregated services - suspend and resume of personal data. In Nikita Borisov and Philippe Golle, editors, Privacy Enhancing Technologies, volume 4776 of Lecture Notes in Computer Science, pages 218-232. Springer, 2007.
-
(2007)
Nikita Borisov and Philippe Golle, editors, Privacy Enhancing Technologies, volume 4776 of Lecture Notes in Computer Science
, pp. 218-232
-
-
Schunter, M.1
Waidner, M.2
-
102
-
-
84957811521
-
Protecting Privacy during On-Line Trust Negotiation
-
Privacy Enhancing Technologies
-
Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, and Ryan Jarvis. Protecting privacy during on-line trust negotiation. In Privacy Enhancing Technologies, volume 2482 of LNCS, pages 129-143. Springer, 2003. ISBN 3-540-00565-X. (Pubitemid 36309884)
-
(2003)
Lecture Notes in Computer Science
, Issue.2482
, pp. 129-143
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Yu, L.4
Jarvis, R.5
-
103
-
-
80051606788
-
Ns2: Networked searchable store with correctness
-
VLDB Endowment, ISBN 978-1-59593-649-3
-
Radu Sion, Sumeet Bajaj, Bogdan Carbunar, and Stefan Katzenbeisser. Ns2: networked searchable store with correctness. In VLDB '07, pages 1342-1345. VLDB Endowment, 2007. ISBN 978-1-59593-649-3.
-
(2007)
VLDB ' 07
, pp. 1342-1345
-
-
Sion, R.1
Bajaj, S.2
Carbunar, B.3
Katzenbeisser, S.4
-
104
-
-
77952280061
-
Location privacy in location-based services: Beyond ttp-based schemes
-
Agusti Solanas, Josep Domingo-Ferrer, and Antoni Martínez- Ballesté. Location privacy in location-based services: Beyond ttp-based schemes. In PiLBA, 2008.
-
(2008)
PiLBA
-
-
Solanas, A.1
Domingo-Ferrer, J.2
Martínez-Ballesté, A.3
-
105
-
-
70349689745
-
-
GWU Law School Public Law Research Paper No. 129
-
Daniel J. Solove. A Taxonomy of Privacy. GWU Law School Public Law Research Paper No. 129, 2006.
-
(2006)
A Taxonomy of Privacy
-
-
Solove, D.J.1
-
106
-
-
60449120378
-
Lorrie Faith Cranor. Engineering privacy
-
ISSN 0098-5589. doi
-
Sarah Spiekermann and Lorrie Faith Cranor. Engineering privacy. IEEE Trans. Softw. Eng., 35(1):67-82, 2009. ISSN 0098-5589. doi: http://dx.doi.org/ 10.1109/TSE.2008. 88.
-
(2009)
IEEE Trans. Softw. Eng.
, vol.35
, Issue.1
, pp. 67-82
-
-
Spiekermann, S.1
-
107
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
DOI 10.1142/S0218488502001648
-
Latanya Sweeney. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):557-570, 2002. ISSN 0218-4885. doi: http: //dx.doi.org/10.1142/S0218488502001648. (Pubitemid 35384857)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
108
-
-
80051608849
-
Privacy and information acquisition in competitive markets
-
Working Paper Series 1165, Berkeley Olin Program in Law & Economics, May
-
Curt Taylor. Privacy and information acquisition in competitive markets. Berkeley Olin Program in Law & Economics, Working Paper Series 1165, Berkeley Olin Program in Law & Economics, May 2004a.
-
(2004)
Berkeley Olin Program in Law & Economics
-
-
Taylor, C.1
-
109
-
-
14744272901
-
Consumer privacy and the market for customer information
-
Winter
-
Curtis R. Taylor. Consumer privacy and the market for customer information. RAND Journal of Economics, 35(4):631-650, Winter 2004b.
-
(2004)
RAND Journal of Economics
, vol.35
, Issue.4
, pp. 631-650
-
-
Taylor, C.R.1
-
111
-
-
77952377083
-
Blacklistable anonymous credentials: Blocking misbehaving users without ttps
-
Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith. Blacklistable anonymous credentials: blocking misbehaving users without ttps. In ACM Conference on Computer and Communications Security, pages 72-81, 2007.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 72-81
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
112
-
-
70349290797
-
Perea: Towards practical ttp-free revocation in anonymous authentication
-
Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith. Perea: towards practical ttp-free revocation in anonymous authentication. In ACM Conference on Computer and Communications Security, pages 333-344, 2008.
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 333-344
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
113
-
-
80051619794
-
-
CreateSpace, Paramount, CA, ISBN 1441421343,9781441421340
-
Peter Wayner. Translucent Databases 2nd Edition: Confusion, misdirection, random- ness, sharing, authentication and steganography to defend privacy. CreateSpace, Paramount, CA, 2009. ISBN 1441421343, 9781441421340.
-
(2009)
Translucent Databases 2nd Edition: Confusion Misdirection Randomness, Sharing, Authentication and Steganography to Defend Privacy
-
-
Wayner, P.1
|