메뉴 건너뛰기




Volumn , Issue , 2011, Pages 283-292

Privacy preservation approach in service ecosystems

Author keywords

Architecture; Privacy; Service ecosystem

Indexed keywords

COMMUNICATION SOLUTIONS; CURRENT COMPUTING; MATURITY MODEL; OPEN SERVICES; PRIVACY PRESERVATION; ROADMAP; SENSITIVE INFORMATIONS; SERVICE ECOSYSTEMS; TECHNICAL FACILITY;

EID: 80054795212     PISSN: 15417719     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EDOCW.2011.59     Document Type: Conference Paper
Times cited : (3)

References (35)
  • 1
    • 34250162841 scopus 로고    scopus 로고
    • From trading to eCommunity management: Responding to social and contractual challenges
    • DOI 10.1007/s10796-007-9031-x
    • L. Kutvonen, J. Metso, and S. Ruohomaa, "From trading to eCommunity management: Responding to social and contractual challenges," Information Systems Frontiers (ISF)-Special Issue on Enterprise Services Computing: Evolution and Challenges, vol. 9, no. 2-3, pp. 181-194, Jul. 2007. [Online]. Available: http://dx.doi.org/10.1007/s10796-007-9031-x (Pubitemid 46897539)
    • (2007) Information Systems Frontiers , vol.9 , Issue.2-3 , pp. 181-194
    • Kutvonen, L.1    Metso, J.2    Ruohomaa, S.3
  • 6
    • 49049105781 scopus 로고    scopus 로고
    • Service typing in collaborative systems
    • G. Doumeingts, J. Müller, G. Morel, and B. Vallespir, Eds. Springer, Apr. [Online]. Available
    • -"Service Typing in Collaborative Systems," in Enterprise Interoperability: New Challenges and Approaches, G. Doumeingts, J. Müller, G. Morel, and B. Vallespir, Eds. Springer, Apr. 2007, pp. 343-354. [Online]. Available: http://dx.doi.org/10.1007/978-1-84628-714-532
    • (2007) Enterprise Interoperability: New Challenges and Approaches , pp. 343-354
    • Ruokolainen, T.1    Kutvonen, L.2
  • 8
    • 72849120742 scopus 로고    scopus 로고
    • Managing interoperability knowledge in open service ecosystems
    • V. Tosic, Ed., in conjunction with the EDOC'09 conference. Online
    • T. Ruokolainen and L. Kutvonen, "Managing Interoperability Knowledge in Open Service Ecosystems," in Enterprise Distributed Object Computing Conference Workshops, V. Tosic, Ed., 2009, pp. 203-211, in conjunction with the EDOC'09 conference. [Online]. Available: http://dx.doi.org/10.1109/EDOCW.2009. 5331993
    • (2009) Enterprise Distributed Object Computing Conference Workshops , pp. 203-211
    • Ruokolainen, T.1    Kutvonen, L.2
  • 10
    • 0000320829 scopus 로고
    • The right to privacy
    • dec
    • S. D. Warren and L. D. Brandeis, "The right to privacy," Harvard Law Review, vol. 4, no. 5, pp. 193-220, dec 1890.
    • (1890) Harvard Law Review , vol.4 , Issue.5 , pp. 193-220
    • Warren, S.D.1    Brandeis, L.D.2
  • 14
    • 77954933040 scopus 로고    scopus 로고
    • Future Internet Enterprise Systems (FInES) cluster position paper
    • Tech. Rep. Sep., Online
    • M.-S. Li, M. Kürümlüoǧlu, M. Mazura, and R. van den Berg, Eds., "Future Internet Enterprise Systems (FInES) cluster position paper," EU FP7 FInES cluster, Tech. Rep., Sep. 2009. [Online]. Available: http://cordis.europa.eu/fp7/ ict/enet/fines-positionpaper en.html
    • (2009) EU FP7 FInES Cluster
    • Li, M.-S.1    Kürümlüoǧlu, M.2    Mazura, M.3    Van Den Berg, R.4
  • 16
    • 77955303955 scopus 로고    scopus 로고
    • Measuring long-term location privacy in vehicular communication systems
    • July
    • Z. Ma, F. Kargl, and M. Weber, "Measuring long-term location privacy in vehicular communication systems," Comput. Commun., vol. 33, pp. 1414-1427, July 2010.
    • (2010) Comput. Commun , vol.33 , pp. 1414-1427
    • Ma, Z.1    Kargl, F.2    Weber, M.3
  • 19
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • DOI 10.1109/69.971193
    • P. Samarati, "Protecting respondents' identities in microdata release," IEEE Transactions on Knowledge and Data Engineering, vol. 13, pp. 1010-1027, 2001. (Pubitemid 34035590)
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 21
    • 33750054462 scopus 로고    scopus 로고
    • Enterprise privacy promises and enforcement
    • ser. WITS '05. New York, NY, USA: ACM, Online
    • A. Barth and J. C. Mitchell, "Enterprise privacy promises and enforcement," in Proceedings of the 2005 workshop on Issues in the theory of security, ser. WITS '05. New York, NY, USA: ACM, 2005, pp. 58-66. [Online]. Available: http://doi.acm.org/10.1145/1045405.1045412
    • (2005) Proceedings of the 2005 Workshop on Issues in the Theory of Security , pp. 58-66
    • Barth, A.1    Mitchell, J.C.2
  • 22
    • 84948735377 scopus 로고    scopus 로고
    • A privacy policy model for enterprises
    • ser. CSFW '02. Washington, DC, USA: IEEE Computer Society, Online
    • G. Karjoth and M. Schunter, "A privacy policy model for enterprises," in Proceedings of the 15th IEEE workshop on Computer Security Foundations, ser. CSFW '02. Washington, DC, USA: IEEE Computer Society, 2002, pp. 271-281. [Online]. Available: http://portal.acm.org/citation.cfm?id=794201. 795180
    • (2002) Proceedings of the 15th IEEE Workshop on Computer Security Foundations , pp. 271-281
    • Karjoth, G.1    Schunter, M.2
  • 23
    • 33748064714 scopus 로고    scopus 로고
    • A comparison of two privacy policy languages: Epal and xacml
    • CA, USA, Tech. Rep
    • A. Anderson, "A comparison of two privacy policy languages: Epal and xacml," Mountain View, CA, USA, Tech. Rep., 2005.
    • (2005) Mountain View
    • Anderson, A.1
  • 24
    • 35048861274 scopus 로고    scopus 로고
    • Analyzing website privacy requirements using a privacy goal taxonomy
    • ser. RE '02. Washington, DC, USA: IEEE Computer Society, Online
    • A. I. Antón, J. B. Earp, and A. Reese, "Analyzing website privacy requirements using a privacy goal taxonomy," in Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering, ser. RE '02. Washington, DC, USA: IEEE Computer Society, 2002, pp. 23-31. [Online]. Available: http://portal.acm.org/citation.cfm?id=647648.760605
    • (2002) Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering , pp. 23-31
    • Antón, A.I.1    Earp, J.B.2    Reese, A.3
  • 25
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and rationality in individual decision making
    • DOI 10.1109/MSP.2005.22
    • A. Acquisti and J. Grossklags, "Privacy and rationality in individual decision making," IEEE Security and Privacy, vol. 3, pp. 26-33, January 2005. [Online]. Available: http://portal.acm.org/citation.cfm?id= 1048715.1048819 (Pubitemid 40325579)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 26-33
    • Acquisti, A.1    Grossklags, J.2
  • 27
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
    • Designing Privacy Enhancing Technologies
    • A. Pfitzmann and M. Köhntopp, "Anonymity, unobservability, and pseudeonymity - a proposal for terminology," in International workshop on Designing privacy enhancing technologies. New York, NY, USA: Springer-Verlag New York, Inc., 2001, pp. 1-9. (Pubitemid 33241784)
    • (2001) Lecture Notes in Computer Science , Issue.2009 , pp. 1-9
    • Pfitzmann, A.1    Kohntopp, M.2
  • 31
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-90, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 32
    • 0041566006 scopus 로고    scopus 로고
    • What is trust? a conceptual analysis and an interdisciplinary model
    • Online
    • D. H. McKnight and N. L. Chervany, "What is trust? a conceptual analysis and an interdisciplinary model," in AMCIS 2000 Proceedings, no. 382, 2000. [Online]. Available: http://aisel.aisnet.org/amcis2000/382
    • (2000) AMCIS 2000 Proceedings , Issue.382
    • McKnight, D.H.1    Chervany, N.L.2
  • 33
    • 33751040560 scopus 로고    scopus 로고
    • On the secrecy of timingbased active watermarking trace-back techniques
    • P. Peng, P. Ning, and D. S. Reeves, "On the secrecy of timingbased active watermarking trace-back techniques," Security and Privacy, IEEE Symposium on, vol. 0, pp. 334-349, 2006.
    • (2006) Security and Privacy, IEEE Symposium on , vol.0 , pp. 334-349
    • Peng, P.1    Ning, P.2    Reeves, D.S.3
  • 34
    • 70349323153 scopus 로고    scopus 로고
    • Assessing privacy criteria for drm using eu privacy legislation
    • ser. DRM '08. New York, NY, USA: ACM, Online
    • A. Becker, A. Arnab, and M. Serra, "Assessing privacy criteria for drm using eu privacy legislation," in Proceedings of the 8th ACM workshop on Digital rights management, ser. DRM '08. New York, NY, USA: ACM, 2008, pp. 77-86. [Online]. Available: http://doi.acm.org/10.1145/1456520.1456534
    • (2008) Proceedings of the 8th ACM Workshop on Digital Rights Management , pp. 77-86
    • Becker, A.1    Arnab, A.2    Serra, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.