-
1
-
-
77954600929
-
Selecting skyline services for qos-based web service composition
-
M. Alrifai, D. Skoutas, and T. Risse, "Selecting Skyline Services for QoS-Based Web Service Composition," in Proc. 19th Int'l Conf. WWW, 2010, pp. 11-20.
-
(2010)
Proc. 19th Int'l Conf. WWW
, pp. 11-20
-
-
Alrifai, M.1
Skoutas, D.2
Risse, T.3
-
2
-
-
77956392439
-
A query rewriting approach for web service composition
-
July-Sept.
-
M. Barhamgi, D. Benslimane, and B. Medjahed, "A Query Rewriting Approach for Web Service Composition," IEEE Trans. Serv. Comput., vol. 3, no. 3, pp. 206-222, July-Sept. 2010.
-
(2010)
IEEE Trans. Serv. Comput.
, vol.3
, Issue.3
, pp. 206-222
-
-
Barhamgi, M.1
Benslimane, D.2
Medjahed, B.3
-
3
-
-
0003602434
-
-
Washington, DC, USA: Nat. Acad. Press
-
G.T. Duncan, T.B. Jabine, and V.A. de Wolf, Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics. Washington, DC, USA: Nat. Acad. Press, 1993.
-
(1993)
Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics
-
-
Duncan, G.T.1
Jabine, T.B.2
De Wolf, V.A.3
-
4
-
-
84865689933
-
Service-oriented architecture for high- dimensional private data mashup
-
B.C.M. Fung, T. Trojer, P.C.K. Hung, L. Xiong, K. Al-Hussaeni, and R. Dssouli, "Service-oriented Architecture for High- Dimensional Private Data Mashup," IEEE Trans. Serv. Comput., vol. 5, no. 3, pp. 373-386, 2012.
-
(2012)
IEEE Trans. Serv. Comput.
, vol.5
, Issue.3
, pp. 373-386
-
-
Fung, B.C.M.1
Trojer, T.2
Hung, P.C.K.3
Xiong, L.4
Al-Hussaeni, K.5
Dssouli, R.6
-
5
-
-
84884623812
-
Privacy enforcement in data analysis workflows
-
CEUR Workshop Proceedings, T.Finin, L. Kagal, and D. Olmedilla, Eds., Busan, South Korea, Nov., CEUR-WS.org
-
Y. Gil, W. Cheung, V. Ratnakar, and K.K. Chan, "Privacy Enforcement in Data Analysis Workflows," in Proc. Workshop PEAS ISWC/ASWC, vol. 320, CEUR Workshop Proceedings, T.Finin, L. Kagal, and D. Olmedilla, Eds., Busan, South Korea, Nov. 2007, CEUR-WS.org.
-
(2007)
Proc. Workshop PEAS ISWC/ASWC
, vol.320
-
-
Gil, Y.1
Cheung, W.2
Ratnakar, V.3
Chan, K.K.4
-
6
-
-
77955877886
-
Reasoning about the appropriate use of private data through computationalworkflows
-
Mar., Papers from the AAAI Spring Symposium
-
Y. Gil and C. Fritz, "Reasoning About the Appropriate Use of Private Data Through ComputationalWorkflows," in Proc. Intell. Inf. Privacy Manage., Mar. 2010, pp. 69-74, Papers from the AAAI Spring Symposium.
-
(2010)
Proc. Intell. Inf. Privacy Manage.
, pp. 69-74
-
-
Gil, Y.1
Fritz, C.2
-
7
-
-
85065578926
-
A privacy-preserving index for range queries
-
B. Hore, S. Mehrotra, and G. Tsudik, "A Privacy-Preserving Index for Range Queries," in Proc. 13th Int'l Conf. VLDB, vol. 30, VLDB Endowment, 2004, pp. 720-731.
-
(2004)
Proc. 13th Int'l Conf. VLDB, Vol. 30, VLDB Endowment
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
8
-
-
78650760999
-
Automating privacy compliance with expdt
-
Washington, DC, USA
-
M. Kähmer, M. Gilliot, and G. Müller, "Automating Privacy Compliance with ExPDT," in Proc. 10th IEEE Conf. E-Commerce Technol./5th IEEE Conf. Enterprise Comput., E-Commerce and E-Serv., Washington, DC, USA, 2008, pp. 87-94.
-
(2008)
Proc. 10th IEEE Conf. E-Commerce Technol./5th IEEE Conf. Enterprise Comput., E-Commerce and E-Serv.
, pp. 87-94
-
-
Kähmer, M.1
Gilliot, M.2
Müller, G.3
-
9
-
-
38049134850
-
Multi-party, privacy- preserving distributed data mining using a game theoretic framework
-
H. Kargupta, K. Das, and K. Liu, "Multi-party, Privacy- Preserving Distributed Data Mining Using a Game Theoretic Framework," in Proc. 11th Eur. Conf. Principles PKDD, 2007, pp. 523-531.
-
(2007)
Proc. 11th Eur. Conf. Principles PKDD
, pp. 523-531
-
-
Kargupta, H.1
Das, K.2
Liu, K.3
-
10
-
-
77950894900
-
Security of social information from query analysis in daas
-
J. Kawamoto and M. Yoshikawa, "Security of Social Information from Query Analysis in DaaS," in Proc. EDBT/ICDT Workshops, 2009, pp. 148-152.
-
(2009)
Proc. EDBT/ICDT Workshops
, pp. 148-152
-
-
Kawamoto, J.1
Yoshikawa, M.2
-
11
-
-
78049470113
-
A pervasive p3p-based negotiation mechanism for privacy-aware pervasive e-commerce
-
Dec.
-
O. Kwon, "A pervasive P3P-Based Negotiation Mechanism for Privacy-Aware Pervasive E-Commerce," Decis. Support Syst., vol. 50, no. 1, pp. 213-221, Dec. 2010.
-
(2010)
Decis. Support Syst.
, vol.50
, Issue.1
, pp. 213-221
-
-
Kwon, O.1
-
12
-
-
70350650951
-
Lattice based privacy negotiation rule generation for context-aware service
-
Y. Lee, D. Sarangi, O. Kwon, and M.-Y. Kim, "Lattice Based Privacy Negotiation Rule Generation for Context-Aware Service," in Proc. 6th Int'l Conf. UIC, 2009, pp. 340-352.
-
(2009)
Proc. 6th Int'l Conf. UIC
, pp. 340-352
-
-
Lee, Y.1
Sarangi, D.2
Kwon, O.3
Kim, M.-Y.4
-
13
-
-
79951826623
-
Integration and verification of privacy policies using DSML's structural semantics in a SOA-based workflow environment
-
Aug.
-
Y. Lee, J. Werner, and J. Sztipanovits, "Integration and Verification of Privacy Policies Using DSML's Structural Semantics in a SOA-Based Workflow Environment," J. Korean Soc. Internet Inf., vol. 10, no. 149, pp. 139-149, Aug. 2009.
-
(2009)
J. Korean Soc. Internet Inf.
, vol.10
, Issue.149
, pp. 139-149
-
-
Lee, Y.1
Werner, J.2
Sztipanovits, J.3
-
14
-
-
84870437892
-
The privacy advocate: Assertion of privacy by personalised contracts
-
Lecture Notes in Business Information Processing J. Filipe and J.A.M. Cordeiro, Eds
-
M. Maaser, S. Ortmann, and P. Langendörfer, "The Privacy Advocate: Assertion of Privacy by Personalised Contracts," in Proc. WEBIST, vol. 8, Lecture Notes in Business Information Processing, J. Filipe and J.A.M. Cordeiro, Eds., 2007, pp. 85-97.
-
(2007)
Proc. WEBIST
, vol.8
, pp. 85-97
-
-
Maaser, M.1
Ortmann, S.2
Langendörfer, P.3
-
15
-
-
77952262067
-
Data publishing against realistic adversaries
-
Aug.
-
A. Machanavajjhala, J. Gehrke, and M. Götz, "Data Publishing Against Realistic Adversaries," Proc. VLDB Endowment, vol. 2, no. 1, pp. 790-801, Aug. 2009.
-
(2009)
Proc. VLDB Endowment
, vol.2
, Issue.1
, pp. 790-801
-
-
Machanavajjhala, A.1
Gehrke, J.2
Götz, M.3
-
16
-
-
52649169678
-
Privacy: Theory meets practice on the map
-
A. Machanavajjhala, D. Kifer, J.M. Abowd, J. Gehrke, and L. Vilhuber, "Privacy: Theory Meets Practice on the Map," in Proc. IEEE ICDE, 2008, pp. 277-286.
-
(2008)
Proc. IEEE ICDE
, pp. 277-286
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.M.3
Gehrke, J.4
Vilhuber, L.5
-
17
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Mar.
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-diversity: Privacy Beyond k-Anonymity," ACM Trans. Knowl. Discov. Data, vol. 1, no. 1, p. 3, Mar. 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
18
-
-
0038208063
-
Business-to-business interactions: Issues and enabling technologies
-
DOI 10.1007/s00778-003-0087-z
-
B. Medjahed, B. Benatallah, A. Bouguettaya, A.H.H. Ngu, and A.K. Elmagarmid, "Business-to-Business Interactions: Issues and Enabling Technologies," VLDB J., vol. 12, no. 1, pp. 59-85, May 2003. (Pubitemid 36752334)
-
(2003)
VLDB Journal
, vol.12
, Issue.1
, pp. 59-85
-
-
Medjahed, B.1
Benatallah, B.2
Bouguettaya, A.3
Ngu, A.H.H.4
Elmagarmid, A.K.5
-
19
-
-
35048824772
-
Privacy-awaremobile agent: Protecting privacy in open systems by modelling social behaviour of software agents
-
Lecture Notes in Computer Science, A. Omicini, P. Petta, and J. Pitt, Eds
-
A.P.Meyer, "Privacy-AwareMobile Agent: Protecting Privacy in Open Systems by Modelling Social Behaviour of Software Agents," in Proc. ESAW, vol. 3071, Lecture Notes in Computer Science, A. Omicini, P. Petta, and J. Pitt, Eds., 2003, pp. 123-135.
-
(2003)
Proc. ESAW
, vol.3071
, pp. 123-135
-
-
Meyer, A.P.1
-
20
-
-
70349096680
-
Privacy-preserving data mashup
-
N. Mohammed, B.C.M. Fung, K. Wang, and P.C.K. Hung, "Privacy- Preserving Data Mashup," in Proc. 12th Int'l Conf. EDBT, 2009, pp. 228-239.
-
(2009)
Proc. 12th Int'l Conf. EDBT
, pp. 228-239
-
-
Mohammed, N.1
Fung, B.C.M.2
Wang, K.3
Hung, P.C.K.4
-
21
-
-
78049347196
-
Value added privacy services for healthcare data
-
L. Motiwalla and X.B. Li, "Value Added Privacy Services for Healthcare Data," in Proc. IEEE Congr. Serv., 2010, pp. 64-71.
-
(2010)
Proc. IEEE Congr. Serv.
, pp. 64-71
-
-
Motiwalla, L.1
Li, X.B.2
-
22
-
-
79951818798
-
Privacy model and annotation for daas
-
G.A.P. Antonio Brogi and C. Pautasso, Eds., Dec.
-
M. Mrissa, S.-E. Tbahriti, and H.-L. Truong, "Privacy Model and Annotation for DaaS," in Proc. ECOWS, G.A.P. Antonio Brogi and C. Pautasso, Eds., Dec. 2010, pp. 3-10.
-
(2010)
Proc. ECOWS
, pp. 3-10
-
-
Mrissa, M.1
Tbahriti, S.-E.2
Truong, H.-L.3
-
23
-
-
80052892858
-
Reputation management for composite services in service-oriented systems
-
S. Nepal, Z. Malik, and A. Bouguettaya, "Reputation Management for Composite Services in Service-Oriented Systems," Int'l J. Web Service Res., vol. 8, no. 2, pp. 29-52, 2011.
-
(2011)
Int'l J. Web Service Res.
, vol.8
, Issue.2
, pp. 29-52
-
-
Nepal, S.1
Malik, Z.2
Bouguettaya, A.3
-
24
-
-
77950679035
-
Semantic-based mashup of composite applications
-
Jan.-Mar.
-
A.H.H. Ngu, M.P. Carlson, Q.Z. Sheng, and H.-Y. Paik, "Semantic-Based Mashup of Composite Applications," IEEE Trans. Serv. Comput., vol. 3, no. 1, pp. 2-15, Jan.-Mar. 2010.
-
(2010)
IEEE Trans. Serv. Comput.
, vol.3
, Issue.1
, pp. 2-15
-
-
Ngu, A.H.H.1
Carlson, M.P.2
Sheng, Q.Z.3
Paik, H.-Y.4
-
25
-
-
84903169419
-
-
Oasis. Extensible Access Control Markup Language (XACML) (v1.1)
-
Oasis. Extensible Access Control Markup Language (XACML). Identity, (v1.1):134, 2006.
-
(2006)
Identity
, pp. 134
-
-
-
26
-
-
45849119065
-
Privacy-aware access control through negotiation in daily life service
-
H.-A. Park, J. Zhan, and D.H. Lee, "Privacy-Aware Access Control Through Negotiation in Daily Life Service," in Proc. IEEE ISI PAISI, PACCF, SOCO Int'l Workshops Intell. Secur. Informat., 2008, pp. 514-519.
-
(2008)
Proc. IEEE ISI PAISI, PACCF, SOCO Int'l Workshops Intell. Secur. Informat.
, pp. 514-519
-
-
Park, H.-A.1
Zhan, J.2
Lee, D.H.3
-
27
-
-
2642512091
-
A model forweb services discovery with QoS
-
S. Ran, "A model forWeb services discovery with QoS," SIGecom Exchanges, vol. 4, no. 1, pp. 1-10, 2003.
-
(2003)
SIGecom Exchanges
, vol.4
, Issue.1
, pp. 1-10
-
-
Ran, S.1
-
28
-
-
80155212967
-
MeerkatVA dynamic privacy framework forweb services
-
O. Boissier, B. Benatallah, M.P. Papazoglou, Z.W. Ras, and M.-S. Hacid, Eds
-
S.-E. Tbahriti, B. Medjahed, Z.Malik, C. Ghedira, and M.Mrissa, "MeerkatVA Dynamic Privacy Framework forWeb Services," in Proc. Web Intell., O. Boissier, B. Benatallah, M.P. Papazoglou, Z.W. Ras, and M.-S. Hacid, Eds., 2011, pp. 418-421.
-
(2011)
Proc. Web Intell.
, pp. 418-421
-
-
Tbahriti, S.-E.1
Medjahed, B.2
Malik, Z.3
Ghedira, C.4
Mrissa, M.5
-
29
-
-
84860728618
-
How to preserve privacy in services interaction
-
L. Barolli, T. Enokido, F. Xhafa, and M. Takizawa, Eds
-
S.-E. Tbahriti, B. Medjahed, Z.Malik, C. Ghedira, and M.Mrissa, "How to Preserve Privacy in Services Interaction," in Proc. AINA Workshops, L. Barolli, T. Enokido, F. Xhafa, and M. Takizawa, Eds., 2012, pp. 66-71.
-
(2012)
Proc. AINA Workshops
, pp. 66-71
-
-
Tbahriti, S.-E.1
Medjahed, B.2
Malik, Z.3
Ghedira, C.4
Mrissa, M.5
-
30
-
-
80052804889
-
Privacy-aware daas services composition
-
Lecture Notes in Computer Science, A. Hameurlain, S.W. Liddle, K.-D. Schewe, and X. Zhou, Eds
-
S.-E. Tbahriti, M. Mrissa, B.Medjahed, C. Ghedira, M. Barhamgi, and J. Fayn, "Privacy-Aware DaaS Services Composition," in Proc. DEXA I, vol. 6860, Lecture Notes in Computer Science, A. Hameurlain, S.W. Liddle, K.-D. Schewe, and X. Zhou, Eds., 2011, pp. 202-216.
-
(2011)
Proc. DEXA i
, vol.6860
, pp. 202-216
-
-
Tbahriti, S.-E.1
Mrissa, M.2
Medjahed, B.3
Ghedira, C.4
Barhamgi, M.5
Fayn, J.6
-
31
-
-
84885664744
-
Personalizing search via automated analysis of interests and activities
-
J. Teevan, S.T. Dumais, and E. Horvitz, "Personalizing Search via Automated Analysis of Interests and Activities," in Proc. 28th Annu. Int'l ACM SIGIR Conf. Res. Dev. Inf. Retrieval, 2005, pp. 449-456.
-
(2005)
Proc. 28th Annu. Int'l ACM SIGIR Conf. Res. Dev. Inf. Retrieval
, pp. 449-456
-
-
Teevan, J.1
Dumais, S.T.2
Horvitz, E.3
-
32
-
-
84870376786
-
A semantic-based user privacy protection framework for web services
-
Lecture Notes in Computer Science, B. Mobasher and S.S. Anand, Eds
-
A. Tumer, A. Dogac, and I.H. Toroslu, "A Semantic-Based User Privacy Protection Framework for Web Services," in Proc. ITWP, vol. 3169, Lecture Notes in Computer Science, B. Mobasher and S.S. Anand, Eds., 2003, pp. 289-305.
-
(2003)
Proc. ITWP
, vol.3169
, pp. 289-305
-
-
Tumer, A.1
Dogac, A.2
Toroslu, I.H.3
-
33
-
-
57749202243
-
Modeling and discovery of data providing services
-
Washington, DC, USA
-
R. Vaculín, H. Chen, R. Neruda, and K. Sycara, "Modeling and Discovery of Data Providing Services," in Proc. IEEE Int'l Conf. Web Serv., Washington, DC, USA, 2008, pp. 54-61.
-
(2008)
Proc. IEEE Int'l Conf. Web Serv.
, pp. 54-61
-
-
Vaculín, R.1
Chen, H.2
Neruda, R.3
Sycara, K.4
-
34
-
-
84903151708
-
-
W3C, The Platform for Privacy Preference Specification
-
W3C, The Platform for Privacy Preference Specification, 2004.
-
(2004)
-
-
-
35
-
-
3042666264
-
QoS-aware middleware for web services composition
-
May
-
L. Zeng, B. Benatallah, A.H.H. Ngu, M. Dumas, J. Kalagnanam, and H. Chang, "QoS-Aware Middleware for Web Services Composition," IEEE Trans. Softw. Eng., vol. 30, no. 5, pp. 311- 327, May 2004.
-
(2004)
IEEE Trans. Softw. Eng.
, vol.30
, Issue.5
, pp. 311-327
-
-
Zeng, L.1
Benatallah, B.2
Ngu, A.H.H.3
Dumas, M.4
Kalagnanam, J.5
Chang, H.6
|