-
1
-
-
34250162841
-
From trading to eCommunity management: Responding to social and contractual challenges
-
DOI 10.1007/s10796-007-9031-x
-
L. Kutvonen, J. Metso, and S. Ruohomaa, "From trading to eCommunity management: Responding to social and contractual challenges," Information Systems Frontiers (ISF)-Special Issue on Enterprise Services Computing: Evolution and Challenges, vol. 9, no. 2-3, pp. 181-194, Jul. 2007. [Online]. Available: http://dx.doi.org/10.1007/s10796-007-9031-x (Pubitemid 46897539)
-
(2007)
Information Systems Frontiers
, vol.9
, Issue.2-3
, pp. 181-194
-
-
Kutvonen, L.1
Metso, J.2
Ruohomaa, S.3
-
2
-
-
34250214652
-
Interoperability middleware for federated business services in web-Pilarcos
-
Jan., Online
-
L. Kutvonen, T. Ruokolainen, and J. Metso, "Interoperability middleware for federated business services in web-Pilarcos," International Journal of Enterprise Information Systems, Special issue on Interoperability of Enterprise Systems and Applications, vol. 3, no. 1, pp. 1-21, Jan. 2007. [Online]. Available: http://www.idea-group.com/articles/details.asp?id=6597
-
(2007)
International Journal of Enterprise Information Systems, Special Issue on Interoperability of Enterprise Systems and Applications
, vol.3
, Issue.1
, pp. 1-21
-
-
Kutvonen, L.1
Ruokolainen, T.2
Metso, J.3
-
3
-
-
77958002936
-
Service-oriented middleware for managing inter-enterprise collaborations
-
Dec., Online
-
L. Kutvonen, T. Ruokolainen, S. Ruohomaa, and J. Metso, "Service-oriented middleware for managing inter-enterprise collaborations," in Global Implications of Modern Enterprise Information Systems: Technologies and Applications, ser. Advances in Enterprise Information Systems (AEIS). IGI Global, Dec. 2008, pp. 209-241. [Online]. Available: http://www.igi-global.com/reference/details.asp?id=9648
-
(2008)
Global Implications of Modern Enterprise Information Systems: Technologies and Applications, Ser. Advances in Enterprise Information Systems (AEIS). IGI Global
, pp. 209-241
-
-
Kutvonen, L.1
Ruokolainen, T.2
Ruohomaa, S.3
Metso, J.4
-
4
-
-
49049099664
-
Making multi-dimensional trust decisions on inter-enterprise collaborations
-
Barcelona, Spain: IEEE Computer Society, Mar. [Online]
-
S. Ruohomaa and L. Kutvonen, "Making multi-dimensional trust decisions on inter-enterprise collaborations," in Proceedings of the Third International Conference on Availability, Security and Reliability (ARES 2008). Barcelona, Spain: IEEE Computer Society, Mar. 2008, pp. 873-880. [Online]. Available:
-
(2008)
Proceedings of the Third International Conference on Availability, Security and Reliability (ARES 2008)
, pp. 873-880
-
-
Ruohomaa, S.1
Kutvonen, L.2
-
6
-
-
49049105781
-
Service typing in collaborative systems
-
G. Doumeingts, J. Müller, G. Morel, and B. Vallespir, Eds. Springer, Apr. [Online]. Available
-
-"Service Typing in Collaborative Systems," in Enterprise Interoperability: New Challenges and Approaches, G. Doumeingts, J. Müller, G. Morel, and B. Vallespir, Eds. Springer, Apr. 2007, pp. 343-354. [Online]. Available: http://dx.doi.org/10.1007/978-1-84628-714-532
-
(2007)
Enterprise Interoperability: New Challenges and Approaches
, pp. 343-354
-
-
Ruokolainen, T.1
Kutvonen, L.2
-
7
-
-
33947701357
-
Managing virtual organizations with contracts
-
The Netherlands, Sep., Online
-
J. Metso and L. Kutvonen, "Managing Virtual Organizations with Contracts," in Workshop on Contract Architectures and Languages (CoALa2005), Enschede, The Netherlands, Sep. 2005. [Online]. Available: http://www.dstc.edu.au/Research/Projects/coala/2005/
-
(2005)
Workshop on Contract Architectures and Languages (CoALa2005), Enschede
-
-
Metso, J.1
Kutvonen, L.2
-
8
-
-
72849120742
-
Managing interoperability knowledge in open service ecosystems
-
V. Tosic, Ed., in conjunction with the EDOC'09 conference. Online
-
T. Ruokolainen and L. Kutvonen, "Managing Interoperability Knowledge in Open Service Ecosystems," in Enterprise Distributed Object Computing Conference Workshops, V. Tosic, Ed., 2009, pp. 203-211, in conjunction with the EDOC'09 conference. [Online]. Available: http://dx.doi.org/10.1109/EDOCW.2009. 5331993
-
(2009)
Enterprise Distributed Object Computing Conference Workshops
, pp. 203-211
-
-
Ruokolainen, T.1
Kutvonen, L.2
-
9
-
-
80054796851
-
Safeguarding against new privacy threats in inter-enterprise collaboration environments
-
Tech. Rep. C
-
P. Moen, S. Ruohomaa, L. Viljanen, and L. Kutvonen, "Safeguarding against new privacy threats in inter-enterprise collaboration environments," University of Helsinki, Department of Computer Science, Tech. Rep. C-2010-56, 2010.
-
(2010)
University of Helsinki, Department of Computer Science
, pp. 2010-2056
-
-
Moen, P.1
Ruohomaa, S.2
Viljanen, L.3
Kutvonen, L.4
-
10
-
-
0000320829
-
The right to privacy
-
dec
-
S. D. Warren and L. D. Brandeis, "The right to privacy," Harvard Law Review, vol. 4, no. 5, pp. 193-220, dec 1890.
-
(1890)
Harvard Law Review
, vol.4
, Issue.5
, pp. 193-220
-
-
Warren, S.D.1
Brandeis, L.D.2
-
12
-
-
34247265367
-
The Ecolead ICT infrastructure for collaborative networked organizations
-
Springer
-
R. J. Rabelo, S. Gusmeroli, C. Arana, and T. Nagellen, "The ECOLEAD ICT infrastructure for collaborative networked organizations," in Network-Centric Collaboration and Supporting Frameworks, vol. 224. Springer, 2006, pp. 451-460.
-
(2006)
Network-Centric Collaboration and Supporting Frameworks
, vol.224
, pp. 451-460
-
-
Rabelo, R.J.1
Gusmeroli, S.2
Arana, C.3
Nagellen, T.4
-
14
-
-
77954933040
-
Future Internet Enterprise Systems (FInES) cluster position paper
-
Tech. Rep. Sep., Online
-
M.-S. Li, M. Kürümlüoǧlu, M. Mazura, and R. van den Berg, Eds., "Future Internet Enterprise Systems (FInES) cluster position paper," EU FP7 FInES cluster, Tech. Rep., Sep. 2009. [Online]. Available: http://cordis.europa.eu/fp7/ ict/enet/fines-positionpaper en.html
-
(2009)
EU FP7 FInES Cluster
-
-
Li, M.-S.1
Kürümlüoǧlu, M.2
Mazura, M.3
Van Den Berg, R.4
-
16
-
-
77955303955
-
Measuring long-term location privacy in vehicular communication systems
-
July
-
Z. Ma, F. Kargl, and M. Weber, "Measuring long-term location privacy in vehicular communication systems," Comput. Commun., vol. 33, pp. 1414-1427, July 2010.
-
(2010)
Comput. Commun
, vol.33
, pp. 1414-1427
-
-
Ma, Z.1
Kargl, F.2
Weber, M.3
-
17
-
-
34548525381
-
A middleware architecture for privacy protection
-
DOI 10.1016/j.comnet.2007.06.010, PII S1389128607001685, Innovations in Web Communications Infrastructure
-
G. V. Lioudakis, E. A. Koutsoloukas, N. L. Dellas, N. Tselikas, S. Kapellaki, G. N. Prezerakos, D. I. Kaklamani, and I. S. Venieris, "A middleware architecture for privacy protection," Computer Networks, vol. 51, no. 16, pp. 4679-4696, 2007. (Pubitemid 47385366)
-
(2007)
Computer Networks
, vol.51
, Issue.16
, pp. 4679-4696
-
-
Lioudakis, G.V.1
Koutsoloukas, E.A.2
Dellas, N.L.3
Tselikas, N.4
Kapellaki, S.5
Prezerakos, G.N.6
Kaklamani, D.I.7
Venieris, I.S.8
-
18
-
-
77950301466
-
An access control approach for privacy-preserving passive network monitoring
-
ICITST 2009. International Conference for, 2009
-
G. Lioudakis, F. Gogoulos, A. Antonakopoulou, A. Mousas, I. Venieris, and D. Kaklamani, "An access control approach for privacy-preserving passive network monitoring," in Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for, 2009, pp. 1-8.
-
(2009)
Internet Technology and Secured Transactions
, pp. 1-8
-
-
Lioudakis, G.1
Gogoulos, F.2
Antonakopoulou, A.3
Mousas, A.4
Venieris, I.5
Kaklamani, D.6
-
19
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
P. Samarati, "Protecting respondents' identities in microdata release," IEEE Transactions on Knowledge and Data Engineering, vol. 13, pp. 1010-1027, 2001. (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
21
-
-
33750054462
-
Enterprise privacy promises and enforcement
-
ser. WITS '05. New York, NY, USA: ACM, Online
-
A. Barth and J. C. Mitchell, "Enterprise privacy promises and enforcement," in Proceedings of the 2005 workshop on Issues in the theory of security, ser. WITS '05. New York, NY, USA: ACM, 2005, pp. 58-66. [Online]. Available: http://doi.acm.org/10.1145/1045405.1045412
-
(2005)
Proceedings of the 2005 Workshop on Issues in the Theory of Security
, pp. 58-66
-
-
Barth, A.1
Mitchell, J.C.2
-
22
-
-
84948735377
-
A privacy policy model for enterprises
-
ser. CSFW '02. Washington, DC, USA: IEEE Computer Society, Online
-
G. Karjoth and M. Schunter, "A privacy policy model for enterprises," in Proceedings of the 15th IEEE workshop on Computer Security Foundations, ser. CSFW '02. Washington, DC, USA: IEEE Computer Society, 2002, pp. 271-281. [Online]. Available: http://portal.acm.org/citation.cfm?id=794201. 795180
-
(2002)
Proceedings of the 15th IEEE Workshop on Computer Security Foundations
, pp. 271-281
-
-
Karjoth, G.1
Schunter, M.2
-
23
-
-
33748064714
-
A comparison of two privacy policy languages: Epal and xacml
-
CA, USA, Tech. Rep
-
A. Anderson, "A comparison of two privacy policy languages: Epal and xacml," Mountain View, CA, USA, Tech. Rep., 2005.
-
(2005)
Mountain View
-
-
Anderson, A.1
-
24
-
-
35048861274
-
Analyzing website privacy requirements using a privacy goal taxonomy
-
ser. RE '02. Washington, DC, USA: IEEE Computer Society, Online
-
A. I. Antón, J. B. Earp, and A. Reese, "Analyzing website privacy requirements using a privacy goal taxonomy," in Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering, ser. RE '02. Washington, DC, USA: IEEE Computer Society, 2002, pp. 23-31. [Online]. Available: http://portal.acm.org/citation.cfm?id=647648.760605
-
(2002)
Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering
, pp. 23-31
-
-
Antón, A.I.1
Earp, J.B.2
Reese, A.3
-
25
-
-
14744275332
-
Privacy and rationality in individual decision making
-
DOI 10.1109/MSP.2005.22
-
A. Acquisti and J. Grossklags, "Privacy and rationality in individual decision making," IEEE Security and Privacy, vol. 3, pp. 26-33, January 2005. [Online]. Available: http://portal.acm.org/citation.cfm?id= 1048715.1048819 (Pubitemid 40325579)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
27
-
-
84937564790
-
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
-
Designing Privacy Enhancing Technologies
-
A. Pfitzmann and M. Köhntopp, "Anonymity, unobservability, and pseudeonymity - a proposal for terminology," in International workshop on Designing privacy enhancing technologies. New York, NY, USA: Springer-Verlag New York, Inc., 2001, pp. 1-9. (Pubitemid 33241784)
-
(2001)
Lecture Notes in Computer Science
, Issue.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Kohntopp, M.2
-
28
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
March
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity," ACM Trans. Knowl. Discov. Data, vol. 1, March 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
-
-
MacHanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
29
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and ℓ-diversity
-
DOI 10.1109/ICDE.2007.367856, 4221659, 23rd International Conference on Data Engineering, ICDE 2007
-
N. Li, T. Li, and S. Venkatasubramanian, "t-closeness: Privacy beyond k-anonymity and l-diversity," in Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on, 2007, pp. 106-115. (Pubitemid 47422014)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 106-115
-
-
Ninghui, L.1
Tiancheng, L.2
Venkatasubramanian, S.3
-
31
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-90, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
32
-
-
0041566006
-
What is trust? a conceptual analysis and an interdisciplinary model
-
Online
-
D. H. McKnight and N. L. Chervany, "What is trust? a conceptual analysis and an interdisciplinary model," in AMCIS 2000 Proceedings, no. 382, 2000. [Online]. Available: http://aisel.aisnet.org/amcis2000/382
-
(2000)
AMCIS 2000 Proceedings
, Issue.382
-
-
McKnight, D.H.1
Chervany, N.L.2
-
33
-
-
33751040560
-
On the secrecy of timingbased active watermarking trace-back techniques
-
P. Peng, P. Ning, and D. S. Reeves, "On the secrecy of timingbased active watermarking trace-back techniques," Security and Privacy, IEEE Symposium on, vol. 0, pp. 334-349, 2006.
-
(2006)
Security and Privacy, IEEE Symposium on
, vol.0
, pp. 334-349
-
-
Peng, P.1
Ning, P.2
Reeves, D.S.3
-
34
-
-
70349323153
-
Assessing privacy criteria for drm using eu privacy legislation
-
ser. DRM '08. New York, NY, USA: ACM, Online
-
A. Becker, A. Arnab, and M. Serra, "Assessing privacy criteria for drm using eu privacy legislation," in Proceedings of the 8th ACM workshop on Digital rights management, ser. DRM '08. New York, NY, USA: ACM, 2008, pp. 77-86. [Online]. Available: http://doi.acm.org/10.1145/1456520.1456534
-
(2008)
Proceedings of the 8th ACM Workshop on Digital Rights Management
, pp. 77-86
-
-
Becker, A.1
Arnab, A.2
Serra, M.3
-
35
-
-
35048898814
-
Privacy and utility in business processes
-
Washington, DC, USA: IEEE Computer Society, Online
-
A. Barth, J. Mitchell, A. Datta, and S. Sundaram, "Privacy and utility in business processes," in Proceedings of the 20th IEEE Computer Security Foundations Symposium. Washington, DC, USA: IEEE Computer Society, 2007, pp. 279-294. [Online]. Available: http://portal.acm.org/citation.cfm?id= 1270382.1270658
-
(2007)
Proceedings of the 20th IEEE Computer Security Foundations Symposium
, pp. 279-294
-
-
Barth, A.1
Mitchell, J.2
Datta, A.3
Sundaram, S.4
|