메뉴 건너뛰기




Volumn 43, Issue 7, 2013, Pages 769-787

A pattern language for developing privacy enhancing technologies

Author keywords

pattern; pattern language; PET; privacy

Indexed keywords

LOCATION MONITORING; ON-LINE COMMUNICATION; ONLINE DATA SHARING; PATTERN; PATTERN LANGUAGES; PERSONALLY IDENTIFIABLE INFORMATION; PRIVACY ENHANCING TECHNOLOGIES; RESEARCH AND DEVELOPMENT;

EID: 84878677619     PISSN: 00380644     EISSN: 1097024X     Source Type: Journal    
DOI: 10.1002/spe.1131     Document Type: Article
Times cited : (56)

References (70)
  • 1
  • 9
  • 12
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy for reducing web site privacy vulnerabilities
    • August
    • Antõn I, Earp B,. A requirements taxonomy for reducing web site privacy vulnerabilities. Required Engineering August 2004 9: 169-185.
    • (2004) Required Engineering , vol.9 , pp. 169-185
    • Antõn, I.1    Earp, B.2
  • 13
    • 0030644696 scopus 로고    scopus 로고
    • Privacy-enhancing technologies for the Internet
    • In. IEEE Computer Society Press: Los Alamitos, CA, Feb
    • Goldberg I, Wagner D, Brewer E,. Privacy-enhancing technologies for the Internet. In Proceedings of 42nd IEEE Spring COMPCON. IEEE Computer Society Press: Los Alamitos, CA, Feb. 1997.
    • (1997) Proceedings of 42nd IEEE Spring COMPCON
    • Goldberg, I.1    Wagner, D.2    Brewer, E.3
  • 21
    • 0003250582 scopus 로고    scopus 로고
    • An introduction to software stability
    • Fayad ME, Altman A,. An introduction to software stability. Communications of the ACM 2001; 44 (9): 95-98.
    • (2001) Communications of the ACM , vol.44 , Issue.9 , pp. 95-98
    • Fayad, M.E.1    Altman, A.2
  • 22
    • 0041882022 scopus 로고    scopus 로고
    • Thinking objectively: Merging multiple conventional models in one stable model
    • Fayad M, Wu S,. Thinking objectively: Merging multiple conventional models in one stable model. Communications of the ACM 2002; 45 (9): 102-106.
    • (2002) Communications of the ACM , vol.45 , Issue.9 , pp. 102-106
    • Fayad, M.1    Wu, S.2
  • 23
    • 84878734944 scopus 로고    scopus 로고
    • Anonymizer.com. Online privacy services
    • Anonymizer.com. Online privacy services.
  • 24
    • 84878685654 scopus 로고    scopus 로고
    • iProxy.net. iProxy anonymizer service
    • iProxy.net. iProxy anonymizer service. Available from: http://iproxy.net/.
  • 26
  • 32
    • 84885574219 scopus 로고    scopus 로고
    • release 1.1.10, Aug
    • Minshall G,. Tcpdpriv, release 1.1.10, Aug. 1997.
    • (1997) Tcpdpriv
    • Minshall, G.1
  • 33
    • 4444266989 scopus 로고    scopus 로고
    • Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
    • Oct
    • Fan J, Xu J, Ammar MH, Moon SB,. Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. Computer Networks (Amsterdam, Netherlands: 1999) Oct. 2004; 46 (2): 253-272.
    • (2004) Computer Networks (Amsterdam, Netherlands: 1999) , vol.46 , Issue.2 , pp. 253-272
    • Fan, J.1    Xu, J.2    Ammar, M.H.3    Moon, S.B.4
  • 34
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags (extended abstract)
    • In, Lecture Notes in Computer Science. Springer: Berlin / Heidelberg
    • Juels A,. Minimalist cryptography for low-cost RFID tags (extended abstract). In Security in Communication Networks, Vol. 3352, Lecture Notes in Computer Science. Springer: Berlin / Heidelberg, 2005; 149-164.
    • (2005) Security in Communication Networks , vol.3352 , pp. 149-164
    • Juels, A.1
  • 35
    • 26444435642 scopus 로고    scopus 로고
    • RFID Guardian: A battery-powered mobile device for RFID privacy management
    • In, Boyd C. Nieto J.M.G. (eds), Lecture Notes in Computer Science. Springer: New York, NY
    • Rieback MR, Crispo B, Tanenbaum AS,. RFID Guardian: A battery-powered mobile device for RFID privacy management. In ACISP, Vol. 3574, Boyd C, Nieto JMG, (eds), Lecture Notes in Computer Science. Springer: New York, NY, 2005; 184-194.
    • (2005) ACISP , vol.3574 , pp. 184-194
    • Rieback, M.R.1    Crispo, B.2    Tanenbaum, A.S.3
  • 36
    • 33746092119 scopus 로고    scopus 로고
    • High-power proxies for enhancing RFID privacy and utility
    • In, Lecture Notes in Computer Science. Springer: New York, NY
    • Juels A, Syverson PF, Bailey DV,. High-power proxies for enhancing RFID privacy and utility. In Privacy Enhancing Technologies, Vol. 3856, Lecture Notes in Computer Science. Springer: New York, NY, 2005; 210-226.
    • (2005) Privacy Enhancing Technologies , vol.3856 , pp. 210-226
    • Juels, A.1    Syverson, P.F.2    Bailey, D.V.3
  • 40
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum D,. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 1981; 24 (2): 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 42
    • 33746097415 scopus 로고    scopus 로고
    • Privacy issues in vehicular ad hoc networks
    • In, Danezis G. Martin D. (eds), Lecture Notes in Computer Science. Springer: New York, NY
    • Dötzer F,. Privacy issues in vehicular ad hoc networks. In Privacy Enhancing Technologies, Vol. 3856, Danezis G, Martin D, (eds), Lecture Notes in Computer Science. Springer: New York, NY, 2005; 197-209.
    • (2005) Privacy Enhancing Technologies , vol.3856 , pp. 197-209
    • Dötzer, F.1
  • 43
    • 2342617507 scopus 로고    scopus 로고
    • E-voting: Secret-ballot receipts: True voter-verifiable elections
    • Jan. Feb
    • Chaum D,. E-voting: secret-ballot receipts: True voter-verifiable elections. IEEE Security and Privacy Jan. Feb. 2004 2 (1): 38-47.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.1 , pp. 38-47
    • Chaum, D.1
  • 46
    • 2942590116 scopus 로고    scopus 로고
    • RFID systems and security and privacy implications
    • In, Lecture Notes in Computer Science. Springer: Berlin / Heidelberg
    • Sarma S, Weis S, Engels D,. RFID systems and security and privacy implications. In Cryptographic Hardware and Embedded Systems-CHES 2002, Vol. 2523, Lecture Notes in Computer Science. Springer: Berlin / Heidelberg, 2003; 1-19.
    • (2003) Cryptographic Hardware and Embedded Systems - CHES 2002 , vol.2523 , pp. 1-19
    • Sarma, S.1    Weis, S.2    Engels, D.3
  • 53
    • 35248832722 scopus 로고    scopus 로고
    • Squealing Euros: Privacy protection in rfid-enabled banknotes
    • In, Lecture Notes in Computer Science. Springer: Berlin / Heidelberg
    • Juels A, Pappu R,. Squealing Euros: Privacy protection in rfid-enabled banknotes. In Financial cryptography, Vol. 2742, Lecture Notes in Computer Science. Springer: Berlin / Heidelberg, 2003; 103-121.
    • (2003) Financial Cryptography , vol.2742 , pp. 103-121
    • Juels, A.1    Pappu, R.2
  • 54
    • 84890010554 scopus 로고    scopus 로고
    • Stop-and-go-mixes providing probabilistic anonymity in an open system
    • In, Lecture Notes in Computer Science. Springer: New York, NY
    • Kesdogan D, Egner J, Bschkes R,. Stop-and-go-mixes providing probabilistic anonymity in an open system. In Information Hiding, Vol. 1525, Lecture Notes in Computer Science. Springer: New York, NY, 1998; 83-98.
    • (1998) Information Hiding , vol.1525 , pp. 83-98
    • Kesdogan, D.1    Egner, J.2    Bschkes, R.3
  • 55
    • 33947121654 scopus 로고    scopus 로고
    • Protection of location privacy using dummies for location-based services
    • In. IEEE Computer Society: Los Alamitos, CA
    • Kido H, Yanagisawa Y, Satoh T,. Protection of location privacy using dummies for location-based services. In ICDE Workshops, Tokyo, Japan. IEEE Computer Society: Los Alamitos, CA, 2005; 1248.
    • (2005) ICDE Workshops, Tokyo, Japan , pp. 1248
    • Kido, H.1    Yanagisawa, Y.2    Satoh, T.3
  • 57
    • 0021389555 scopus 로고
    • Practical data-swapping: The first steps
    • March
    • Reiss SP,. Practical data-swapping: The first steps. ACM Transactions on Database Systems March 1984 9: 20-37.
    • (1984) ACM Transactions on Database Systems , vol.9 , pp. 20-37
    • Reiss, S.P.1
  • 60
    • 0010275933 scopus 로고    scopus 로고
    • Usenet post, August
    • Dai W,. Pipenet 1.1. Usenet post, August 1996.
    • (1996) Pipenet 1.1
    • Dai, W.1
  • 64
    • 77955434225 scopus 로고    scopus 로고
    • Privacy-preserving queries over relational databases
    • In, Atallah M. Hopper N. (eds), Lecture Notes in Computer Science. Springer: New York, NY
    • Olumofin F, Goldberg I,. Privacy-preserving queries over relational databases. In Privacy enhancing technologies, vol. 6205, Atallah M, Hopper N, (eds), Lecture Notes in Computer Science. Springer: New York, NY, 2010.
    • (2010) Privacy Enhancing Technologies , vol.6205
    • Olumofin, F.1    Goldberg, I.2
  • 65
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • In, Lecture Notes in Computer Science. Springer: New York, NY
    • Freedman MJ, Nissim K, Pinkas B,. Efficient private matching and set intersection. In Advances in Cryptology-EUROCRYPT 2004, Vol. 3027, Lecture Notes in Computer Science. Springer: New York, NY, 2004; 1-19.
    • (2004) Advances in Cryptology-EUROCRYPT 2004 , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 66
    • 77955460498 scopus 로고    scopus 로고
    • ICANN Security and Stability Advisory Committee, SAC 024, Feb
    • ICANN Security and Stability Advisory Committee. Report on domain name front running, SAC 024, Feb. 2008.
    • (2008) Report on Domain Name Front Running


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.