-
1
-
-
84855688895
-
Approaches in anomaly-based network intrusion detection systems
-
Advances in Information Security 38. Berlin: Springer
-
Bolzoni, D., and S. Etalle. 2008. Approaches in anomaly-based network intrusion detection systems. In Intrusion Detection Systems, pp. 1-15. Advances in Information Security 38. Berlin: Springer.
-
(2008)
Intrusion Detection Systems
, pp. 1-15
-
-
Bolzoni, D.1
Etalle, S.2
-
4
-
-
80053241361
-
-
Election Process Advisory Commission, accessed June 17, 2011
-
Election Process Advisory Commission. 2007. Voting with confidence. http://www.kiesraad.nl/nl/OverigeContent/Bestanden/pdfthema/PdfvoorEngelsesite/Votingwithconfidence.pdf (accessed June 17, 2011).
-
(2007)
Voting With Confidence
-
-
-
5
-
-
70449482204
-
Floridi's philosophy of information and information ethics: Current perspectives, future directions
-
Ess, C. 2009. Floridi's philosophy of information and information ethics: Current perspectives, future directions. The Information Society 25(3):159-168.
-
(2009)
The Information Society
, vol.25
, Issue.3
, pp. 159-168
-
-
Ess, C.1
-
6
-
-
77951061744
-
Software as risk: Introduction of open standards in the Danish public sector
-
Federspiel, S. B., and B. Brincker. 2010. Software as risk: Introduction of open standards in the Danish public sector. The Information Society 26(1): 38-47.
-
(2010)
The Information Society
, vol.26
, Issue.1
, pp. 38-47
-
-
Federspiel, S.B.1
Brincker, B.2
-
7
-
-
0011101139
-
Information ethics: On the philosophical foundation of computer ethics
-
Floridi, L. 1999. Information ethics: on the philosophical foundation of computer ethics. Ethics and Information Technology 1(1): 37-56.
-
(1999)
Ethics and Information Technology
, vol.1
, Issue.1
, pp. 37-56
-
-
Floridi, L.1
-
8
-
-
33744479964
-
The ontological interpretation of informational privacy
-
Floridi, L. 2005. The ontological interpretation of informational privacy. Ethics and Information Technology 7(4): 185-200.
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.4
, pp. 185-200
-
-
Floridi, L.1
-
9
-
-
67650342504
-
Regulating Profiling in a Democratic Constitutional State
-
eds. M. Hildebrandt and S. Gutwirth, Berlin: Springer
-
Gutwirth, S., and P. de Hert. 2008. Regulating Profiling in a Democratic Constitutional State. In Profiling the European citizen: Crossdisciplinary perspectives, eds. M. Hildebrandt and S. Gutwirth, pp. 271-302. Berlin: Springer.
-
(2008)
Profiling the European Citizen: Crossdisciplinary Perspectives
, pp. 271-302
-
-
Gutwirth, S.1
de Hert, P.2
-
10
-
-
70349118502
-
-
In WITS '05: Proceedings of the 2005 Workshop on Issues in the Theory of Security, New York, NY: ACM
-
Jacobs, B., W. Pieters, and M. Warnier. 2005. Statically checking confidentiality via dynamic labels. In WITS '05: Proceedings of the 2005 Workshop on Issues in the Theory of Security, pp. 50-56. New York, NY: ACM.
-
(2005)
Statically Checking Confidentiality Via Dynamic Labels
, pp. 50-56
-
-
Jacobs, B.1
Pieters, W.2
Warnier, M.3
-
11
-
-
80053271292
-
-
Jericho Forum, accessed June 17, 2011
-
Jericho Forum. 2005. Jericho whitepaper. https://www.opengroup.org/jericho/BusinessCaseforDPv1.0.pdf (accessed June 17, 2011).
-
(2005)
Jericho Whitepaper
-
-
-
12
-
-
84957805078
-
The Platform for enterprise privacy practices: Privacy-enabled management of customer data
-
In PET'02: Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, Berlin: Springer-Verlag
-
Karjoth, G., M. Schunter, and M. Waidner. 2003. The Platform for enterprise privacy practices: privacy-enabled management of customer data. In PET'02: Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, pp. 194-198. Lecture Notes in Computer Science 2482. Berlin: Springer-Verlag.
-
(2003)
Lecture Notes In Computer Science
, vol.2482
, pp. 194-198
-
-
Karjoth, G.1
Schunter, M.2
Waidner, M.3
-
14
-
-
0003487794
-
-
Stanford, CA: Stanford University Press
-
Luhmann, N. 1995. Social systems. Stanford, CA: Stanford University Press.
-
(1995)
Social Systems
-
-
Luhmann, N.1
-
16
-
-
0036824048
-
A better ballot box?
-
Mercuri, R. 2002. A better ballot box? IEEE Spectrum 39:26-50.
-
(2002)
IEEE Spectrum
, vol.39
, pp. 26-50
-
-
Mercuri, R.1
-
17
-
-
79952042104
-
Trust in technological systems
-
Forthcoming, eds. M. de Vries, S. Hansson, and A. Meijers. Berlin: Springer
-
Nickel, P. J. Forthcoming. Trust in technological systems. In Norms and the artificial: Moral and non-moral norms in technology, eds. M. de Vries, S. Hansson, and A. Meijers. Berlin: Springer.
-
Norms and The Artificial: Moral and Non-moral Norms In Technology
-
-
Nickel, P.J.1
-
18
-
-
0032282474
-
Protecting privacy in an information age: The problem of privacy in public
-
Nissenbaum, H. 1998. Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy 17(5/6):559-596.
-
(1998)
Law and Philosophy
, vol.17
, Issue.5-6
, pp. 559-596
-
-
Nissenbaum, H.1
-
19
-
-
72949101002
-
-
In Proceedings of the 24th Annual ACM Symposium on AppliedComputing, SAC'2009, NewYork: ACM
-
Nunes Leal Franqueira, V., R. H. C. Lopes, and P. van Eck. 2009. Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients. In Proceedings of the 24th Annual ACM Symposium on AppliedComputing, SAC'2009, pp. 66-73. NewYork: ACM.
-
(2009)
Multi-step Attack Modelling and Simulation (MsAMS) Framework Based On Mobile Ambients
, pp. 66-73
-
-
Nunes Leal Franqueira, V.1
Lopes, R.H.C.2
van Eck, P.3
-
20
-
-
33745894129
-
Acceptance of voting technology: Between confidence and trust
-
In Trust management, 4th International Conference, iTrust 2006, Berlin: Springer
-
Pieters, W. 2006. Acceptance of voting technology: Between confidence and trust. In Trust management, 4th International Conference, iTrust 2006, pp. 283-297. Lecture Notes in Computer Science 3986. Berlin: Springer.
-
(2006)
Lecture Notes In Computer Science
, vol.3986
, pp. 283-297
-
-
Pieters, W.1
-
21
-
-
70350436675
-
Combatting electoral traces: The Dutch tempest discussion and beyond
-
In E-voting and Identity: Second International Conference, VOTE-ID 2009, Berlin: Springer
-
Pieters, W. 2009. Combatting electoral traces: The Dutch tempest discussion and beyond. In E-voting and Identity: Second International Conference, VOTE-ID 2009, 172-190. Lecture Notes in Computer Science 5767. Berlin: Springer.
-
(2009)
Lecture Notes In Computer Science
, vol.5767
, pp. 172-190
-
-
Pieters, W.1
-
22
-
-
79952042266
-
Reve{a,i}ling the risks: A phenomenology of information security
-
Pieters, W. 2010. Reve{a,i}ling the risks: A phenomenology of information security. Techné: Research in Philosophy and Technology 14:176-188.
-
(2010)
Techné: Research In Philosophy and Technology
, vol.14
, pp. 176-188
-
-
Pieters, W.1
-
23
-
-
79952041624
-
Explanation and trust: What to tell the user in security and AI
-
Pieters, W. 2011a. Explanation and trust: what to tell the user in security and AI. Ethics and Information Technology 13(1):53-64.
-
(2011)
Ethics and Information Technology
, vol.13
, Issue.1
, pp. 53-64
-
-
Pieters, W.1
-
25
-
-
38149049950
-
Where can an insider attack?
-
In Workshop on formal aspects in security and trust, FAST 2006, Berlin: Springer
-
Probst, C.W., R. R. Hansen, and F. Nielson. 2007. Where can an insider attack? In Workshop on formal aspects in security and trust, FAST 2006, pp. 127-142. Lecture Notes in Computer Science 4691. Berlin: Springer.
-
(2007)
Lecture Notes In Computer Science
, vol.4691
, pp. 127-142
-
-
Probst, C.W.1
Hansen, R.R.2
Nielson, F.3
|