-
1
-
-
79959961301
-
Toward accountability in the cloud
-
IEEE Computer Society, July/August issue
-
Pearson, S. "Toward Accountability in the Cloud", View from the Cloud, IEEE Internet Computing, IEEE Computer Society, July/August issue, vol. 15, no. 4, pp. 64-69, 2011.
-
(2011)
View from the Cloud, IEEE Internet Computing
, vol.15
, Issue.4
, pp. 64-69
-
-
Pearson, S.1
-
3
-
-
84942776290
-
Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
-
Casassa Mont, M., Pearson S., Bramhall, P. "Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services", Proc. DEXA 2003, IEEE Computer Society, pp. 377-382, 2003.
-
(2003)
Proc. DEXA 2003, IEEE Computer Society
, pp. 377-382
-
-
Casassa Mont, M.1
Pearson, S.2
Bramhall, P.3
-
4
-
-
0018545449
-
How to share a secret
-
Shamir, A. "How to Share a Secret", Communications of ACM, 22, pp. 612-613, 1979.
-
(1979)
Communications of ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
5
-
-
0004192381
-
-
CRC Press
-
Menezes, J., van Oorschot, P.C., Vanstone, S.A., Handbook of Applied Cryptography. CRC Press, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
6
-
-
84863125437
-
-
Voltage,(www.voltage.com/technology/Technology- FormatPreservingEncryption.htm
-
-
-
-
7
-
-
84863153247
-
-
Navajos, http://navajosystems.com/technology-encryption.asp
-
-
-
-
8
-
-
70549111101
-
Formatpreserving encryption
-
Selected Areas in Cryptography
-
Bellare, M., Ristenpart, T., Rogaway, P., Stegers, T., "Formatpreserving Encryption", Selected Areas in Cryptography, LNCS, vol 5867, pp. 295-312, 2009.
-
(2009)
LNCS
, vol.5867
, pp. 295-312
-
-
Bellare, M.1
Ristenpart, T.2
Rogaway, P.3
Stegers, T.4
-
9
-
-
72849125986
-
-
IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2,2004. http://www.zurich.ibm.com/security/enterpriseprivacy/ epal/
-
(2004)
EPAL Specification, v1.2
-
-
-
10
-
-
84863171639
-
-
OASIS: XACML,http://www.oasisopen.org/committees/tc-home.php?wg-abbrev= xacml
-
-
-
-
12
-
-
84863125442
-
Can access control be extended to deal with data handling in privacy scenarios?
-
November
-
Bussard, L. Becker, M.Y., "Can access control be extended to deal with data handling in privacy scenarios?", Workshop on Access Control Application Scenarios, W3C, November 2009. http://www.w3.org/2009/policy-ws/
-
(2009)
Workshop on Access Control Application Scenarios, W3C
-
-
Bussard, L.1
Becker, M.Y.2
-
13
-
-
78651420383
-
ENCORE: Towards a holistic approach to privacy
-
Papanikolaou, N., Creese, S., Goldsmith, M., Casassa Mont, M., Pearson, S. "ENCORE: Towards a holistic approach to privacy", Proc. SECRYPT 2010.
-
Proc. SECRYPT 2010
-
-
Papanikolaou, N.1
Creese, S.2
Goldsmith, M.3
Casassa Mont, M.4
Pearson, S.5
-
14
-
-
33746682538
-
Enhancing user privacy through data handling policies
-
DOI 10.1007/11805588-16, Data and Applications Security XX - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Proceedings
-
Ardagna, C., Vimercati, S., Samarati, P. "Enhancing user privacy through data handling policies", Data and Applications Security, volume 4127, LNCS, pp. 224-236, 2006. (Pubitemid 44165890)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4127
, pp. 224-236
-
-
Ardagna, C.A.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
16
-
-
79960140014
-
A framework for privacy preferences and data-handling policies
-
September
-
Becker, M.Y., Malkis, A., Bussard, L. "A Framework for Privacy Preferences and Data-Handling Policies", Microsoft Research Cambridge Technical Report, MSR-TR-2009-128, September 2009. http://research.microsoft. com/apps/pubs/default.aspx?id=102614
-
(2009)
Microsoft Research Cambridge Technical Report, MSR-TR-2009-128
-
-
Becker, M.Y.1
Malkis, A.2
Bussard, L.3
-
17
-
-
0009233508
-
-
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language, 2001. http://wwwdse.doc.ic.ac.uk/research/policies/ index.shtml
-
(2001)
The Ponder Policy Specification Language
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
19
-
-
33845532776
-
A system for privacy-aware resource allocation and data processing in dynamic environments
-
DOI 10.1007/0-387-33406-8-44, Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
-
Pearson, S., Casassa Mont, M., "A System for Privacy-aware Resource Allocation and Data Processing in Dynamic Environments", Proc. INetSec06, IFIP, vol. 201, Springer Boston, pp. 471-482, 2006. (Pubitemid 44920681)
-
(2006)
IFIP International Federation for Information Processing
, vol.201
, pp. 471-482
-
-
Pearson, S.1
Casassa-Mont, M.2
-
20
-
-
38949103681
-
Securing information transfer in distributed computing environments
-
DOI 10.1109/MSP.2008.19
-
Pearson, S., Casassa Mont, M. Novoa,M., "Securing Information Transfer within Distributed Computing Environments", IEEE Security & Privacy Magazine, Jan/Feb issue, volume 6, number 1, pp. 34-42, IEEE, 2008. (Pubitemid 351229831)
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.1
, pp. 34-42
-
-
Pearson, S.1
Casassa-Mont, M.2
Novoa, M.3
-
21
-
-
79955822611
-
Data usage control in the future internet cloud
-
Future Interner Assembly, eds. J. Domingue et al. Springer
-
Bezzi, M. and Trabelsi, S. "Data Usage Control in the Future Internet Cloud", Future Interner Assembly, eds. J. Domingue et al., LNCS 6656, Springer, pp. 223-231, 2011.
-
(2011)
LNCS
, vol.6656
, pp. 223-231
-
-
Bezzi, M.1
Trabelsi, S.2
-
22
-
-
35548931529
-
Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system
-
DOI 10.1007/s10796-007-9057-0
-
Zuo, Y, O'Keefe, T., "Post-release information privacy protection: A framework and next-generation priacy-enhanced operating system", Information Systems Frontiers, vol9, no 5, pp. 451-467, Springer, 2007. http://www.springerlink.com/content/03718003288553u5/ (Pubitemid 350007342)
-
(2007)
Information Systems Frontiers
, vol.9
, Issue.5
, pp. 451-467
-
-
Zuo, Y.1
O'keefe, T.2
-
23
-
-
36549070448
-
Watermarking security: A survey
-
Transactions on Data Hiding and Multimedia Security
-
Perez-Freire, L., Comesana, P., Troncoso-Pastoriza, J. and Perez-Gonzalez, F., "Watermarking security: a survey". Transactions on Data Hiding and Multimedia Security, LNCS, 2006.
-
(2006)
LNCS
-
-
Perez-Freire, L.1
Comesana, P.2
Troncoso-Pastoriza, J.3
Perez-Gonzalez, F.4
-
24
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
Proceedings - 21st International Conference on Data Engineering, ICDE 2005
-
Bayardo, R., Agrawal, R., "Data Privacy through Optimal k-Anonymisation", Proc. International Conference on Data Engineering, pp. 217-228, 2005. (Pubitemid 41731133)
-
(2005)
Proceedings - International Conference on Data Engineering
, pp. 217-228
-
-
Bayardo, R.J.1
Agrawal, R.2
-
25
-
-
84863153248
-
-
Ensuring Consent and Revocation project
-
EnCoRe, Ensuring Consent and Revocation project, www.encoreproject.info
-
-
-
-
26
-
-
84894272259
-
Sticky Policies: An approach for privacy management across multiple parties
-
July
-
Pearson, S. and Casassa Mont, M. "Sticky Policies: An Approach for Privacy Management across Multiple Parties", Special Issue on Security and Privacy in an Online World, IEEE Computer, pp. 693-702, July 2011.
-
(2011)
Special Issue on Security and Privacy in An Online World, IEEE Computer
, pp. 693-702
-
-
Pearson, S.1
Casassa Mont, M.2
|