-
1
-
-
78549292872
-
-
Australian Government
-
Australian Government - Office of the Privacy Commissioner: Privacy Impact Assessment Guide. Australian Government (2010), http://www.privacy.gov. au/materials/types/download/9509/6590
-
(2010)
Privacy Impact Assessment Guide
-
-
-
2
-
-
84911355897
-
-
Gartner Inc.: Gartner Inc.
-
Gartner Inc.: Gartner Magic Quadrant for Unified Communications 2010. Gartner Inc. (2010), http://msunified.net/2010/08/09/gartner-magic-quadrant-for- unified-communications-2010/
-
(2010)
Gartner Magic Quadrant for Unified Communications 2010
-
-
-
3
-
-
1842538795
-
Privacy as contextual integrity
-
Nissenbaum, H.: Privacy as contextual integrity. Washington Law Review 79(1), 101-139 (2004)
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 101-139
-
-
Nissenbaum, H.1
-
4
-
-
80455173506
-
CDRAS: An approach to dealing with Man-in-the- Middle attacks in the context of Voice over IP
-
August
-
Hofbauer, S., Quirchmayr, G., Wills, C.C.: CDRAS: An approach to dealing with Man-in-the- Middle attacks in the context of Voice over IP. In: International Conference on Availability, Reliability and Security, ARES 2011, pp. 353-358 (August 2011)
-
(2011)
International Conference on Availability, Reliability and Security, ARES 2011
, pp. 353-358
-
-
Hofbauer, S.1
Quirchmayr, G.2
Wills, C.C.3
-
5
-
-
84911356153
-
-
Cisco Systems Inc.
-
Cisco Systems Inc.: Cisco Call Detail Records Field Descriptions. Cisco Systems Inc. (2010), http://www.cisco.com/en/US/docs/ voice-ip-comm/cucm/ service/8-5-1/cdrdef/cdrfdes.html
-
(2010)
Cisco Call Detail Records Field Descriptions
-
-
-
6
-
-
79952002261
-
A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
-
Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16, 3-32 (2011)
-
(2011)
Requir. Eng.
, vol.16
, pp. 3-32
-
-
Deng, M.1
Wuyts, K.2
Scandariato, R.3
Preneel, B.4
Joosen, W.5
-
7
-
-
70349676044
-
Linking privacy solutions to developer goals
-
Wuyts, K., Scandariato, R., De Decker, B., Joosen, W.: Linking privacy solutions to developer goals. In: International Conference on Availability, Reliability and Security, ARES 2009, pp. 847-852 (2009)
-
(2009)
International Conference on Availability, Reliability and Security, ARES 2009
, pp. 847-852
-
-
Wuyts, K.1
Scandariato, R.2
De Decker, B.3
Joosen, W.4
-
8
-
-
50949085110
-
Addressing privacy requirements in systems design: The pris method
-
Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in systems design: the pris method. Requir. Eng. 13, 241-255 (2008)
-
(2008)
Requir. Eng.
, vol.13
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
11
-
-
50649094035
-
Random-forest-based network intrusion detection systems
-
Zhang, J., Zulkernine, M., Haque, A.: Random-forest-based network intrusion detection systems. IEEE Trans. Syst. Man Cybernet. C Appl. Rev., 84-93 (2008)
-
(2008)
IEEE Trans. Syst. Man Cybernet. C Appl. Rev.
, pp. 84-93
-
-
Zhang, J.1
Zulkernine, M.2
Haque, A.3
-
12
-
-
78649989557
-
-
version v0.34, TU Dresden and ULD Kiel, Tech. Rep.
-
Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - version v0.34, TU Dresden and ULD Kiel, Tech. Rep. (2011), http://dud.inf.tudresden. de/literatur/Anon-Terminology-v0.34.pdf
-
(2011)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management
-
-
Pfitzmann, A.1
Hansen, M.2
-
14
-
-
77953549584
-
Privacy enhancing identity management. Protection against re-identification and profiling
-
ACM
-
Clauß, S., Kesdogan, D., Kölsch, T.: Privacy enhancing identity management. Protection against re-identification and profiling. In: Proceedings of the 2005 Workshop on Digital Identity Management, DIM 2005, pp. 84-93. ACM (2005)
-
(2005)
Proceedings of the 2005 Workshop on Digital Identity Management, DIM 2005
, pp. 84-93
-
-
Clauß, S.1
Kesdogan, D.2
Kölsch, T.3
-
16
-
-
84911359679
-
A process for the automatic generation of white-, grey-, and black-lists from Call Detail Records to prevent VoIP attacks while preserving privacy
-
Beckers, K., Hofbauer, S., Quirchmayr, G., Sorge, C.: A process for the automatic generation of white-, grey-, and black-lists from Call Detail Records to prevent VoIP attacks while preserving privacy. In: International Conference on Availability, Reliability and Security, ARES 2012 (August 2012)
-
International Conference on Availability, Reliability and Security, ARES 2012 (August 2012)
-
-
Beckers, K.1
Hofbauer, S.2
Quirchmayr, G.3
Sorge, C.4
-
17
-
-
70349571535
-
Privacy considerations in awareness systems. Designing with privacy in mind
-
Markopoulos, P., De Ruyter, B., Mackay, W. (eds.) Springer, London
-
Patil, S., Kobsa, A.: Privacy considerations in awareness systems. Designing with privacy in mind. In: Markopoulos, P., De Ruyter, B., Mackay, W. (eds.) Awareness Systems. Human-Computer Interaction Series, pp. 187-206. Springer, London (2009)
-
(2009)
Awareness Systems. Human-Computer Interaction Series
, pp. 187-206
-
-
Patil, S.1
Kobsa, A.2
-
20
-
-
0003729341
-
-
Internet Engineering Task Force (IETF), IETF RFC 2104
-
IETF, Hmac: Keyed-hashing for message authentication, Internet Engineering Task Force (IETF), IETF RFC 2104 (1997), http://tools.ietf.org/rfc/ rfc2104.txt
-
(1997)
Hmac: Keyed-hashing for Message Authentication
-
-
-
22
-
-
77950645484
-
The legal ramifications of call-filtering solutions
-
Sorge, C., Niccolini, S., Seedorf, J.: The legal ramifications of call-filtering solutions. IEEE Security and Privacy 8, 45-50 (2010)
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 45-50
-
-
Sorge, C.1
Niccolini, S.2
Seedorf, J.3
-
23
-
-
78650860654
-
Lessons learned on the usage of call logs for security and management in IP telephony
-
Tartarelli, S., d'Heureuse, N., Niccolini, S.: Lessons learned on the usage of call logs for security and management in IP telephony. IEEE Communications Magazine 48(12), 76-82 (2010)
-
(2010)
IEEE Communications Magazine
, vol.48
, Issue.12
, pp. 76-82
-
-
Tartarelli, S.1
D'Heureuse, N.2
Niccolini, S.3
-
24
-
-
73649140895
-
Security patterns for voice over IP networks
-
IEEE Computer Society, Washington, DC
-
Fernandez, E.B., Pelaez, J.C., Larrondo-Petrie, M.M.: Security patterns for voice over IP networks. In: Proceedings of the International Multi-Conference on Computing in the Global Information Technology, pp. 19-29. IEEE Computer Society, Washington, DC (2007)
-
(2007)
Proceedings of the International Multi-Conference on Computing in the Global Information Technology
, pp. 19-29
-
-
Fernandez, E.B.1
Pelaez, J.C.2
Larrondo-Petrie, M.M.3
|