-
1
-
-
84856157372
-
-
Last Access July 2010
-
The Web's New Gold Mine: Your Secrets. http://online.wsj.com/article/ SB10001424052748703940904575395073512989404.html, 2010. Last Access July 2010.
-
(2010)
The Web's New Gold Mine: Your Secrets
-
-
-
2
-
-
84995514651
-
Privacyenabling social networking over untrusted networks
-
J. Anderson, C. Diaz, J. Bonneau, and F. Stajano. Privacyenabling social networking over untrusted networks. In Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, pages 1-6, 2009.
-
(2009)
Proceedings of the 2nd ACM Workshop on Online Social Networks, WOSN '09
, pp. 1-6
-
-
Anderson, J.1
Diaz, C.2
Bonneau, J.3
Stajano, F.4
-
3
-
-
70450257780
-
Persona: An online social network with user- defined privacy
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: An Online Social Network with User- Defined Privacy. SIGCOMM Computer Communication Review, 39(4):135-146, 2009.
-
(2009)
SIGCOMM Computer Communication Review
, vol.39
, Issue.4
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
4
-
-
79955854747
-
The privacy jungle: On the market for data protection in social networks
-
Springer US
-
J. Bonneau and S. Preibusch. The Privacy Jungle: On the Market for Data Protection in Social Networks. In Economics of Information Security and Privacy, pages 121-167. Springer US, 2010.
-
(2010)
Economics of Information Security and Privacy
, pp. 121-167
-
-
Bonneau, J.1
Preibusch, S.2
-
5
-
-
36349019854
-
The future of social networks on the internet: The need for semantics
-
DOI 10.1109/MIC.2007.138
-
J. Breslin and S. Decker. The Future of Social Networks on the Internet: The Need for Semantics. IEEE Internet Computing, pages 86-90, 2007. (Pubitemid 350148370)
-
(2007)
IEEE Internet Computing
, vol.11
, Issue.6
, pp. 86-90
-
-
Breslin, J.1
Decker, S.2
-
7
-
-
0022145479
-
Security without identification: transaction systems to make big brother obsolete
-
DOI 10.1145/4372.4373
-
D. Chaum. Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM, 28(10):1030-1044, 1985. (Pubitemid 15587967)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum David1
-
8
-
-
0003187764
-
Directive 95/46/EC of the european parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
European Union
-
European Union. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with regard to the Processing of Personal Data and on the Free Movement of such Data. Official Journal of the European Communities, L 281:31-50, 1995.
-
(1995)
Official Journal of the European Communities L
, vol.281
, pp. 31-50
-
-
-
11
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and ℓ-diversity
-
DOI 10.1109/ICDE.2007.367856, 4221659, 23rd International Conference on Data Engineering, ICDE 2007
-
N. Li, T. Li, and S. Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In IEEE 23rd International Conference on Data Engineering (ICDE2007), pages 106-115, 2007. (Pubitemid 47422014)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 106-115
-
-
Ninghui, L.1
Tiancheng, L.2
Venkatasubramanian, S.3
-
12
-
-
67651053584
-
Pseudonym systems
-
A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym Systems. In Selected Areas in Cryptography, pages 184-199, 2000.
-
(2000)
Selected Areas in Cryptography
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
13
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Transaction on Knowledge Discovery Data, 1(1):3, 2007.
-
(2007)
ACM Transaction on Knowledge Discovery Data
, vol.1
, Issue.1
, pp. 3
-
-
MacHanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
17
-
-
0028561148
-
Medical requirements for data protection
-
K. Pommerening. Medical Requirements for Data Protection. In Proceedings of IFIP Congress, volume 2, pages 533-540, 1994.
-
(1994)
Proceedings of IFIP Congress
, vol.2
, pp. 533-540
-
-
Pommerening, K.1
-
18
-
-
20444375246
-
Secondary use of the EHR via pseudonymisation
-
IOS Press
-
K. Pommerening and M. Reng. Secondary Use of the EHR via Pseudonymisation. Medical Care Compunetics 1, IOS Press, pages 441-446, 2004.
-
(2004)
Medical Care Compunetics
, vol.1
, pp. 441-446
-
-
Pommerening, K.1
Reng, M.2
-
19
-
-
17444367785
-
-
(Second Edition). Syngress Publishing
-
R. Russell, D. Kaminsky, R. F. Puppy, J. Grand, D. Ahmad, H. Flynn, I. Dubrawsky, S. W. Manzuik, and R. Permeh. Hack Proofing Your Network (Second Edition). Syngress Publishing, 2002.
-
(2002)
Hack Proofing Your Network
-
-
Russell, R.1
Kaminsky, D.2
Puppy, R.F.3
Grand, J.4
Ahmad, D.5
Flynn, H.6
Dubrawsky, I.7
Manzuik, S.W.8
Permeh, R.9
-
20
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
P. Samarati and L. Sweeney. Protecting Privacy when Disclosing Information: k-anonymity and its Enforcement through Generalization and Suppression. Technical report, SRI International, 1998.
-
(1998)
Technical Report SRI International
-
-
Samarati, P.1
Sweeney, L.2
-
23
-
-
70350632870
-
A brief survey on anonymization techniques for privacy preserving publishing of social network data
-
B. Zhou, J. Pei, and W. Luk. A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data. ACM SIGKDD Explorations Newsletter, 10:12-22, 2008.
-
(2008)
ACM SIGKDD Explorations Newsletter
, vol.10
, pp. 12-22
-
-
Zhou, B.1
Pei, J.2
Luk, W.3
|