-
1
-
-
74549161061
-
Technical Specification 3rd Generation Partnership Project
-
3GPP Generic User Profile-Architecture, Stage 2, Sophia-Antipolis
-
3GPP. 2007. Technical Specification 3rd Generation Partnership Project. Technical Specification Group Services and System Aspects. 3GPP Generic User Profile-Architecture, Stage 2, Sophia-Antipolis.
-
(2007)
Technical Specification Group Services and System Aspects
-
-
-
2
-
-
0242674432
-
Hippocratic databases
-
Agrawal, R., Kiernan, J., Srikant, R. and Xu, Y. 2002. Hippocratic databases. Proceedings of the 28th International Conference on Very Large Data Bases (VLDB’02).
-
(2002)
Proceedings of the 28th International Conference on Very Large Data Bases (VLDB’02).
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
18844394838
-
XPref: A preference language for P3P
-
Agrawal, R., Kiernan, J., Srikant, R. and Xu, Y. 2005. XPref: A preference language for P3P. Computer Networks 48(5):809-827.
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 809-827
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
5
-
-
85054463652
-
Privacy-enhanced location-based access control
-
ed. M. Gertz, and S. Jajodia, Springer-Verlag
-
Ardagna, C. A., Cremonini, M., Capitani di Vimercati and S. De, Samarati, P. 2007. Privacy-enhanced location-based access control. In Handbook of Database Security: Applications and Trends, ed. M. Gertz, and S. Jajodia, Springer-Verlag.
-
(2007)
Handbook of Database Security: Applications and Trends
-
-
Ardagna, C.A.1
Cremonini, M.2
di Vimercati, C.3
De, S.4
Samarati, P.5
-
6
-
-
85056510751
-
Privacy-enhanced location services information
-
ed. Acquisti, De Capitani di Vimercati, Gritzalis, and Lambrinoudakis, Auerbach Publications (Taylor and Francis Group)
-
Ardagna, C. A., Cremonini, M., Damiani, E., Capitani di Vimercati and S. de, Samarati, P. 2007. Privacy-enhanced location services information. In Digital Privacy: Theory, Technologies and Practices, ed. Acquisti, De Capitani di Vimercati, Gritzalis, and Lambrinoudakis, Auerbach Publications (Taylor and Francis Group).
-
(2007)
Digital Privacy: Theory, Technologies and Practices
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
di Vimercati, C.4
de Samarati, P.5
-
7
-
-
85054439871
-
-
Opinion 5/2005 on the use of location data with a view to providing value-added services
-
Article 29 Data Protection Working Party. 2005. Opinion 5/2005 on the use of location data with a view to providing value-added services.
-
(2005)
-
-
-
8
-
-
85054431116
-
-
Working document on data protection issues related to RFID technology
-
Article 29 Data Protection Working Party. 2005. Working document on data protection issues related to RFID technology.
-
(2005)
-
-
-
9
-
-
85054427236
-
-
Enterprise Privacy Authorization Language (EPAL 1.2), accessed April 1, 2009
-
Ashley, P., Hada, S., Karjoth, G., Powers, C. and Schunter, M. 2003. Enterprise Privacy Authorization Language (EPAL 1.2), http://www.Zurich.ibm.com/security/enterprise-privacy/epal/Specif ication (accessed April 1, 2009).
-
(2003)
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
10
-
-
0142157015
-
A Toolkit for Managing Enterprise Privacy Policies
-
Springer-Verlag
-
Backes, M., Pfitzmann, B. and Schunter, M. 2003. A Toolkit for Managing Enterprise Privacy Policies. Proceedings of the 8th European Symposium on Research in Computer Security, 162-180, Springer-Verlag.
-
(2003)
Proceedings of the 8th European Symposium on Research in Computer Security
, pp. 162-180
-
-
Backes, M.1
Pfitzmann, B.2
Schunter, M.3
-
11
-
-
33750053325
-
Privacy-preserving database systems
-
ed. A. Al-dini, R. Gorrieri, and F. Martinelli, Springer-Verlag
-
Bertino, E., Byun, J. and Li, N. 2005. Privacy-preserving database systems. In Foundations of Security Analysis and Design III, ed. A. Al-dini, R. Gorrieri, and F. Martinelli, 178-206, Springer-Verlag.
-
(2005)
Foundations of Security Analysis and Design III
, pp. 178-206
-
-
Bertino, E.1
Byun, J.2
Li, N.3
-
12
-
-
84979809728
-
The EU data protection directive: An engine of a global regime
-
Birnhack, M. D. 2008. The EU data protection directive: An engine of a global regime. Computer Law and Security Report 24(6):508-520.
-
(2008)
Computer Law and Security Report
, vol.24
, Issue.6
, pp. 508-520
-
-
Birnhack, M.D.1
-
14
-
-
33745921913
-
Dealing with privacy obligations: Important aspects and technical approaches
-
ed. S. Fischer-Huebner, S. Furnell and C. Lambrinoudakis, Springer-Verlag
-
Casassa Mont and M. 2004. Dealing with privacy obligations: Important aspects and technical approaches. In Trust and Privacy in Digital Business, ed. S. Fischer-Huebner, S. Furnell and C. Lambrinoudakis, 120-131, Springer-Verlag.
-
(2004)
Trust and Privacy in Digital Business
, pp. 120-131
-
-
Mont, C.M.1
-
16
-
-
26844457831
-
I bidn’t buy it for myself
-
ed. C.-M. Karat, J.O. Blom, and J. Karat, Norwell, MA, USA: Kluwer Academic Publishers
-
Cranor, L. F. 2004. I bidn’t buy it for myself. In Designing Personalized User Experiences in E-Commerce, ed. C.-M. Karat, J.O. Blom, and J. Karat, 57-73, Norwell, MA, USA: Kluwer Academic Publishers.
-
(2004)
Designing Personalized User Experiences in E-Commerce
, pp. 57-73
-
-
Cranor, L.F.1
-
19
-
-
84898383081
-
Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the safe harbour privacy principles and related frequently asked questions issued by the U.S. Department of Commerce
-
European Commission 2000. Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the safe harbour privacy principles and related frequently asked questions issued by the U.S. Department of Commerce, Official Journal of the European Communities L 215:7-47.
-
(2000)
Official Journal of the European Communities
, vol.L 215
, pp. 7-47
-
-
-
20
-
-
85054469002
-
EOS Gallup Europe
-
Flash Eurobarometer EB 147, accessed June 6, 2009
-
European Omnibus Survey “EOS Gallup Europe.” 2003. “European Union companies’ views about privacy.” Flash Eurobarometer EB 147, http://ec.europa.eu/public_opinion/flash/f1147_data_ protect.pdf (accessed June 6, 2009).
-
(2003)
European Union companies’ views about privacy
-
-
-
21
-
-
0003187764
-
Council Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
European Parliament and Council. 1995. Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal of the European Communities L 281:31-50.
-
(1995)
Official Journal of the European Communities
, vol.L 281
, pp. 31-50
-
-
Parliament, E.1
-
22
-
-
24944574585
-
Council Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)
-
European Parliament and Council. 2002. Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). Official Journal of the European Communities L 201:37-47.
-
(2002)
Official Journal of the European Communities
, vol.L 201
, pp. 37-47
-
-
Parliament, E.1
-
23
-
-
4344597708
-
Council, and Commission Charter of fundamental rights of the European Union
-
European Parliament, Council, and Commission. 2000. Charter of fundamental rights of the European Union. Official Journal of the European Communities C 364:1-22.
-
(2000)
Official Journal of the European Communities
, vol.C 364
, pp. 1-22
-
-
Parliament, E.1
-
24
-
-
84992227458
-
Proposed NIST Standard for role-based access control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, R.D. and Chandramouli, R. 2001. Proposed NIST Standard for role-based access control. A CM Transactions on Information and System Security 4(3):224-274.
-
(2001)
A CM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, R.D.4
Chandramouli, R.5
-
26
-
-
57349182523
-
ROWLBAC: Representing role based access control in OWL
-
ACM Press
-
Finin, T., Joshi, A., Kagal, L., Niu, J., Sandhu, R., Winsborough, W. and Thuraisingham, B. 2008. ROWLBAC: Representing role based access control in OWL. Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 73-82, ACM Press.
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 73-82
-
-
Finin, T.1
Joshi, A.2
Kagal, L.3
Niu, J.4
Sandhu, R.5
Winsborough, W.6
Thuraisingham, B.7
-
30
-
-
85054462205
-
-
1ST Simplicity project homepage
-
1ST Simplicity project homepage, http://www.ist-simplicity.org/.
-
-
-
-
32
-
-
69949113499
-
Architecture for provision of context-aware web applications based on web services
-
IEEE Computer Society Press
-
Kapitsaki, G. M., Kateros, D. A. and Venieris, I. S. 2008. Architecture for provision of context-aware web applications based on web services. Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’08), 1-5, IEEE Computer Society Press.
-
(2008)
Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’08)
, pp. 1-5
-
-
Kapitsaki, G.M.1
Kateros, D.A.2
Venieris, I.S.3
-
33
-
-
85054449398
-
-
Version 1.1, accessed June 06, 2009
-
Liberty Alliance Project. 2005. Liberty ID-SIS Personal Profile Service Specification, Version 1.1, http://www.proj ectliberty.org/liberty/content/download/1028/7146/file/liberty-idsis-pp-vl. 1 .pdf (accessed June 06, 2009).
-
(2005)
Liberty ID-SIS Personal Profile Service Specification
-
-
-
34
-
-
34548525381
-
A middleware architecture for privacy protection
-
Lioudakis, G. V., Koutsoloukas, E. A., Delias, N., Tselikas, N., Kapellaki, S., Prezerakos, G. N., Kaklamani, D. I. and Venieris, I. S. 2007. A middleware architecture for privacy protection. Computer Networks 51(16): 4679-4696.
-
(2007)
Computer Networks
, vol.51
, Issue.16
, pp. 4679-4696
-
-
Lioudakis, G.V.1
Koutsoloukas, E.A.2
Delias, N.3
Tselikas, N.4
Kapellaki, S.5
Prezerakos, G.N.6
Kaklamani, D.I.7
Venieris, I.S.8
-
35
-
-
44349127893
-
Technical enforcement of privacy legislation
-
IEEE Computer Society Press
-
Lioudakis, G. V., Koutsoloukas, E. A., Delias, N., Gaudino, F., Kaklamani, D. I. and Venieris, I. S. 2007. Technical enforcement of privacy legislation. Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’07), 1-6, IEEE Computer Society Press.
-
(2007)
Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’07)
, pp. 1-6
-
-
Lioudakis, G.V.1
Koutsoloukas, E.A.2
Delias, N.3
Gaudino, F.4
Kaklamani, D.I.5
Venieris, I.S.6
-
36
-
-
70349342942
-
A Semantic Framework for Privacy-Aware Access Control. Proceedings of the
-
IEEE Computer Society Press
-
Lioudakis, G. V., Koutsoloukas, E. A., Delias, N., Kapitsaki, G. M., Kaklamani, D. I. and Venieris, I. S. 2008. A Semantic Framework for Privacy-Aware Access Control. Proceedings of the International Multiconference on Computer Science and Information Technology, 813-820, IEEE Computer Society Press.
-
(2008)
International Multiconference on Computer Science and Information Technology
, pp. 813-820
-
-
Lioudakis, G.V.1
Koutsoloukas, E.A.2
Delias, N.3
Kapitsaki, G.M.4
Kaklamani, D.I.5
Venieris, I.S.6
-
37
-
-
0035269007
-
Semantic Web services
-
Mcllraith, S. A., Son, T. C. and Zeng, H. 2001. Semantic Web services. IEEEIntelligent Systems 16(2):46-53.
-
(2001)
IEEEIntelligent Systems
, vol.16
, Issue.2
, pp. 46-53
-
-
McLlraith, S.A.1
Son, T.C.2
Zeng, H.3
-
38
-
-
34548016110
-
Privacy aware role based access control
-
ACM Press
-
Ni, Q., Trombetta, A., Bertino, E. and Lobo, J. 2007. Privacy aware role based access control. Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 41-50. ACM Press.
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 41-50
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
39
-
-
70349310533
-
A Semantic Aware Access Control Model with Real Time Constraints on History of Accesses. Proceedings of the
-
IEEE Computer Society Press
-
Noorollahi Ravari, A., Amini, M. and Jalili, R. 2008. A Semantic Aware Access Control Model with Real Time Constraints on History of Accesses. Proceedings of the International Multiconference on Computer Science and Information Technology, 827-836, IEEE Computer Society Press.
-
(2008)
International Multiconference on Computer Science and Information Technology
, pp. 827-836
-
-
Noorollahi Ravari, A.1
Amini, M.2
Jalili, R.3
-
40
-
-
78751615930
-
-
accessed April 1, 2009
-
Organization for the Advancement of Structured Information Standards (OASIS). 2004. OASIS extensible Access Control Markup Language (XACML) TC. http://www.oasis-open.org/committees/xacml/ (accessed April 1, 2009).
-
(2004)
OASIS extensible Access Control Markup Language (XACML) TC
-
-
-
44
-
-
84979815375
-
The Directive 95/46/EC: Ten years after
-
Poullet, Y. 2006. The Directive 95/46/EC: Ten years after. Computer Law and Security Report 22 (3): 206-217.
-
(2006)
Computer Law and Security Report
, vol.22
, Issue.3
, pp. 206-217
-
-
Poullet, Y.1
-
45
-
-
1542300219
-
Preserving privacy in Web services
-
ACM Fress
-
Rezgui, A., Ouzzani, M., Bouguettaya, A. and Medjahed, B. 2002. Preserving privacy in Web services. Proceedings of the 4th International Workshop on Web Information and Data Management, 56-62, ACM Fress.
-
(2002)
Proceedings of the 4th International Workshop on Web Information and Data Management
, pp. 56-62
-
-
Rezgui, A.1
Ouzzani, M.2
Bouguettaya, A.3
Medjahed, B.4
-
46
-
-
33646499934
-
Context for simplicity: A basis for context-aware systems based on the 3GPP generic user profile
-
Rukzio, E., Prezerakos, G. N., Cortese, G., Koutsoloukas, E. and Kapel-laki, S. 2004. Context for simplicity: A basis for context-aware systems based on the 3GPP generic user profile. Proceedings of the International Conference of Computational Intelligence (ICCI’04), 466469.
-
(2004)
Proceedings of the International Conference of Computational Intelligence (ICCI’04)
, pp. 466469
-
-
Rukzio, E.1
Prezerakos, G.N.2
Cortese, G.3
Koutsoloukas, E.4
Kapel-Laki, S.5
-
50
-
-
33645694894
-
A semantic-based user privacy protection framework for Web services
-
Springer-Verlag
-
Turner, A., Dogac, A., Toroslu and I. H. 2005. A semantic-based user privacy protection framework for Web services. Intelligent Techniques for Web Personalization, 289-305, Springer-Verlag.
-
(2005)
Intelligent Techniques for Web Personalization
, pp. 289-305
-
-
Turner, A.1
Dogac, A.2
Toroslu, I.H.3
-
52
-
-
85054431231
-
-
U.S. Public Law No. 93-579. Dec. 31, 5 U.S.C
-
U.S. Public Law No. 93-579. Dec. 31, 1974. 5 U.S.C. 552.
-
(1974)
, pp. 552
-
-
-
53
-
-
85054449946
-
-
Platform for Privacy Preferences 1.0 (P3P1.0) Specification, accessed June 09, 2009
-
W3C. 2002. Platform for Privacy Preferences 1.0 (P3P1.0) Specification. http://www.w3.org/TR/2002/REC-P3P-20020416/ (accessed June 09, 2009).
-
(2002)
-
-
-
54
-
-
85054427689
-
-
A P3P Preference Exchange Language 1.0 (APPEL1.0), accessed June 9, 2009
-
W3C. 2002. A P3P Preference Exchange Language 1.0 (APPEL1.0). http://www.w3.org/TR/2002/WD-P3P-preferences-20020415 (accessed June 9, 2009).
-
(2002)
-
-
-
55
-
-
24144498846
-
-
accessed June 09, 2009
-
W3C. 2004. Web Ontology Language (OWL), http://www.w3.org/2004/0WL/ (accessed June 09, 2009).
-
(2004)
Web Ontology Language (OWL)
-
-
-
57
-
-
70349141121
-
Research on context modeling based on ontology
-
Ying, X. and Fu-yuan, X. 2006. Research on context modeling based on ontology. Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation, and International Conference on Intelligent Agents, Web Technologies and Internet Commerce, 188.
-
(2006)
Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation, and International Conference on Intelligent Agents, Web Technologies and Internet Commerce
, pp. 188
-
-
Ying, X.1
Fu-Yuan, X.2
|