-
1
-
-
80053141332
-
-
retrieved in 2011
-
TClouds, "Trustworthy Clouds," http://www.tclouds-project.eu/, retrieved in 2011.
-
Trustworthy Clouds
-
-
-
4
-
-
0003187764
-
Directive 95/46/EC of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
EU
-
EU, "Directive 95/46/EC of the European parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data." Official Journal of the European Communities, vol. 281, pp. 31-50, 1995.
-
(1995)
Official Journal of the European Communities
, vol.281
, pp. 31-50
-
-
-
6
-
-
79952002261
-
A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
-
M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements," Requirements Engineering, vol. 16, no. 1, pp. 3-32, 2010.
-
(2010)
Requirements Engineering
, vol.16
, Issue.1
, pp. 3-32
-
-
Deng, M.1
Wuyts, K.2
Scandariato, R.3
Preneel, B.4
Joosen, W.5
-
8
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in EUROCRYPT, 2005, pp. 457-473. (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
9
-
-
76649143738
-
Mediated ciphertext-policy attribute-based encryption and its application
-
L. Ibraimi, M. Petković, S. Nikova, P. H. Hartel, and W. Jonker, "Mediated ciphertext-policy attribute-based encryption and its application," in WISA, 2009, pp. 309-323.
-
(2009)
WISA
, pp. 309-323
-
-
Ibraimi, L.1
Petković, M.2
Nikova, S.3
Hartel, P.H.4
Jonker, W.5
-
10
-
-
78651426152
-
An encryption scheme for a secure policy updating
-
L. Ibraimi, M. Asim, and M. Petković, "An encryption scheme for a secure policy updating," in SECRYPT, 2010, pp. 399-408.
-
(2010)
SECRYPT
, pp. 399-408
-
-
Ibraimi, L.1
Asim, M.2
Petković, M.3
-
11
-
-
80053149760
-
Secure management of personal health records by applying attribute-based encryption
-
July
-
L. Ibraimi, M. Asim, and M. Petković, "Secure management of personal health records by applying attribute-based encryption," Enschede, July 2009.
-
(2009)
Enschede
-
-
Ibraimi, L.1
Asim, M.2
Petković, M.3
-
13
-
-
51949113422
-
Rights management for role-based access control
-
B. Bouwman, S. Mauw, and M. Petković, "Rights management for role-based access control," in The 5th IEEE Consumer Communications and Networking Conference (CCNC), 2008, pp. 1085-1090.
-
(2008)
The 5th IEEE Consumer Communications and Networking Conference (CCNC)
, pp. 1085-1090
-
-
Bouwman, B.1
Mauw, S.2
Petković, M.3
-
14
-
-
71049163493
-
A digital rights management model for healthcare
-
IEEE International Workshop on 0
-
N. P. Sheppard, R. Safavi-Naini, and M. Jafari, "A digital rights management model for healthcare," Policies for Distributed Systems and Networks, IEEE International Workshop on, vol. 0, pp. 106-109, 2009.
-
(2009)
Policies for Distributed Systems and Networks
, pp. 106-109
-
-
Sheppard, N.P.1
Safavi-Naini, R.2
Jafari, M.3
-
15
-
-
78650149922
-
A secure electronic healthcare record infrastructure in the digital rights management model
-
University of Calgary, Tech. Rep., March
-
-, "A secure electronic healthcare record infrastructure in the digital rights management model," Technical Report 2009-939-18, Department of Computer Science, University of Calgary, Tech. Rep., March 2009.
-
(2009)
Technical Report 2009-939-18, Department of Computer Science
-
-
Sheppard, N.P.1
Safavi-Naini, R.2
Jafari, M.3
-
16
-
-
34547379480
-
How to win the clonewars: Efficient periodic n-times anonymous authentication
-
DOI 10.1145/1180405.1180431, 1180431, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich, "How to win the clonewars: efficient periodic n-times anonymous authentication," in ACM Conference on Computer and Communications Security, 2006, pp. 201-210. (Pubitemid 47131369)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 201-210
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
17
-
-
69949124606
-
Randomizable proofs and delegatable anonymous credentials
-
M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, and H. Shacham, "Randomizable proofs and delegatable anonymous credentials," in CRYPTO, 2009, pp. 108-125.
-
(2009)
CRYPTO
, pp. 108-125
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
18
-
-
34548777609
-
Endorsed e-cash
-
DOI 10.1109/SP.2007.15, 4223218, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
J. Camenisch, A. Lysyanskaya, and M. Meyerovich, "Endorsed e-cash," in IEEE Symposium on Security and Privacy, 2007, pp. 101-115. (Pubitemid 47432520)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 101-115
-
-
Camenisch, J.1
Lysyanskaya, A.2
Meyerovich, M.3
|