-
1
-
-
79957981304
-
Datenschutz-schutzziele-revisited
-
M. Rost and A. Pfitzmann, "Datenschutz-Schutzziele-revisited," Datenschutz und Datensicherheit, vol. 33, no. 6, pp. 353-358, 2009.
-
(2009)
Datenschutz und Datensicherheit
, vol.33
, Issue.6
, pp. 353-358
-
-
Rost, M.1
Pfitzmann, A.2
-
2
-
-
84945944391
-
Privacy by design and the new protection goals
-
M. Rost and K. Bock, "Privacy by Design and the New Protection Goals," EuroPriSe Whitepaper, 2011. [Online]. Available: https://www. european-privacy-seal.eu/results/articles/BockRost-PbD-DPG-en.pdf
-
(2011)
EuroPriSe Whitepaper
-
-
Rost, M.1
Bock, K.2
-
3
-
-
84865521711
-
Top 10 mistakes in system design from a privacy perspective and privacy protection goals
-
Springer, IFIP International Federation for Information Processing
-
M. Hansen, "Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals," in Privacy and Identity for Life, ser. IFIP AICT, vol. 375, IFIP International Federation for Information Processing. Springer, 2012, pp. 14-31.
-
(2012)
Privacy and Identity for Life, Ser. IFIP AICT
, vol.375
, pp. 14-31
-
-
Hansen, M.1
-
4
-
-
84945908211
-
Privacy and data protection by design-from policy to engineering
-
G. Danezis, J. Domingo-Ferrer, M. Hansen, J.-H. Hoepman, D. Le Métayer, R. Tirtea, and S. Schiffner, "Privacy and Data Protection by Design-from policy to engineering," ENISA, Tech. Rep., 2014. [Online]. Available: http: //www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/ privacy-and-data-protection-by-design/at download/fullReport
-
(2014)
ENISA, Tech. Rep.
-
-
Danezis, G.1
Domingo-Ferrer, J.2
Hansen, M.3
Hoepman, J.-H.4
Le Métayer, D.5
Tirtea, R.6
Schiffner, S.7
-
5
-
-
84908657937
-
The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR
-
J. Kokott and C. Sobotta, "The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR," International Data Privacy Law, vol. 3, no. 4, pp. 222-228, 2013.
-
(2013)
International Data Privacy Law
, vol.3
, Issue.4
, pp. 222-228
-
-
Kokott, J.1
Sobotta, C.2
-
7
-
-
0004126353
-
Multilateral security: Enabling technologies and their evaluation
-
R. Wilhelm, Ed. Springer
-
A. Pfitzmann, "Multilateral Security: Enabling Technologies and Their Evaluation," in Informatics-10 Years Back, 10 Years Ahead, ser. LNCS, R. Wilhelm, Ed., vol. 2000. Springer, 2001, pp. 50-62.
-
(2001)
Informatics-10 Years Back, 10 Years Ahead, Ser. LNCS
, vol.2000
, pp. 50-62
-
-
Pfitzmann, A.1
-
9
-
-
0033717446
-
Properties of protection goals and their integration into a user interface
-
May
-
G. Wolf and A. Pfitzmann, "Properties of protection goals and their integration into a user interface," Comput. Netw., vol. 32, no. 6, pp. 685-699, May 2000. [Online]. Available: http://dx.doi.org/10.1016/ S1389-1286(00)00029-3
-
(2000)
Comput. Netw.
, vol.32
, Issue.6
, pp. 685-699
-
-
Wolf, G.1
Pfitzmann, A.2
-
12
-
-
41949117635
-
Privacy and identity management
-
M. Hansen, A. Schwartz, and A. Cooper, "Privacy and identity management," IEEE Security & Privacy, vol. 6, no. 2, pp. 38-45, 2008.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.2
, pp. 38-45
-
-
Hansen, M.1
Schwartz, A.2
Cooper, A.3
-
13
-
-
78649989557
-
-
Aug. , v0. 34 http://dud.inf.tu-dresden.de/literatur/AnonTerminologyv0.34.pdf
-
A. Pfitzmann and M. Hansen, "A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management," http://dud.inf.tudresden. de/literatur/Anon Terminology v0.34.pdf, Aug. 2010, v0.34. [Online]. Available: http://dud.inf.tu-dresden.de/literatur/Anon Terminology v0.34.pdf
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
-
Pfitzmann, A.1
Hansen, M.2
-
15
-
-
33646364568
-
Freedom of information and openness: Fundamental human rights?
-
P. Birkinshaw, "Freedom of Information and Openness: Fundamental Human Rights?" Administrative Law Review, vol. 58, no. 1, pp. 177-218, 2006. [Online]. Available: http://www.jstor.org/stable/40712007
-
(2006)
Administrative Law Review
, vol.58
, Issue.1
, pp. 177-218
-
-
Birkinshaw, P.1
-
16
-
-
84886483953
-
DepSky: Dependable and secure storage in a cloud-of-clouds
-
A. N. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, "DepSky: Dependable and Secure Storage in a Cloud-of-Clouds," TOS, vol. 9, no. 4, p. 12, 2013.
-
(2013)
TOS
, vol.9
, Issue.4
, pp. 12
-
-
Bessani, A.N.1
Correia, M.2
Quaresma, B.3
André, F.4
Sousa, P.5
-
19
-
-
84875822474
-
Unique in the crowd: The privacy bounds of human mobility
-
Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, "Unique in the crowd: The privacy bounds of human mobility," in Sci. Rep. 3,1376, 2013, pp. 1-5.
-
(2013)
Sci. Rep.
, vol.3
, Issue.1376
, pp. 1-5
-
-
De Montjoye, Y.-A.1
Hidalgo, C.A.2
Verleysen, M.3
Blondel, V.D.4
-
20
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002. [Online]. Available: http://dx.doi.org/10.1142/S0218488502001648
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
21
-
-
84974655726
-
Secure computation
-
Springer, J. Feigenbaum, Ed
-
S. Micali and P. Rogaway, "Secure computation," in Advances in Cryptology (CRYPTO 91), ser. Lecture Notes in Computer Science, J. Feigenbaum, Ed. Springer, 1992, vol. 576, pp. 392-404.
-
(1992)
Advances in Cryptology (CRYPTO 91), Ser. Lecture Notes in Computer Science
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
23
-
-
0020312165
-
Protocols for secure computations
-
A. C.-C. Yao, "Protocols for secure computations," in FOCS, vol. 82, 1982, pp. 160-164.
-
(1982)
FOCS
, vol.82
, pp. 160-164
-
-
Yao, A.C.-C.1
-
24
-
-
77953754678
-
How to exchange secrets with oblivious transfer
-
M. O. Rabin, "How to exchange secrets with oblivious transfer," 2005, Harvard University Technical Report 81. [Online]. Available: http://eprint.iacr.org/2005/187
-
2005, Harvard University Technical Report 81
-
-
Rabin, M.O.1
-
25
-
-
0032201622
-
Private information retrieval
-
Nov.
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," J. ACM, vol. 45, no. 6, pp. 965-981, Nov. 1998. [Online]. Available: http://doi.acm.org/10.1145/293347.293350
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
26
-
-
80052826972
-
Secure collaborative supply-chain management
-
F. Kerschbaum, A. Schröpfer, A. Zilli, R. Pibernik, O. Catrina, S. de Hoogh, B. Schoenmakers, S. Cimato, and E. Damiani, "Secure collaborative supply-chain management," IEEE Computer, vol. 44, no. 9, pp. 38-43, 2011.
-
(2011)
IEEE Computer
, vol.44
, Issue.9
, pp. 38-43
-
-
Kerschbaum, F.1
Schröpfer, A.2
Zilli, A.3
Pibernik, R.4
Catrina, O.5
De Hoogh, S.6
Schoenmakers, B.7
Cimato, S.8
Damiani, E.9
-
27
-
-
80053153641
-
Towards privacy-preserving XML transformation
-
M. Jensen and F. Kerschbaum, "Towards privacy-preserving XML transformation," in ICWS, 2011, pp. 65-72.
-
(2011)
ICWS
, pp. 65-72
-
-
Jensen, M.1
Kerschbaum, F.2
-
28
-
-
84866638283
-
Fully anonymous attribute tokens from lattices
-
J. Camenisch, G. Neven, and M. Rückert, "Fully anonymous attribute tokens from lattices," in SCN, 2012, pp. 57-75.
-
(2012)
SCN
, pp. 57-75
-
-
Camenisch, J.1
Neven, G.2
Rückert, M.3
-
29
-
-
84945905464
-
Cryptographic primitives for building secure and privacy respecting protocols
-
J. Camenisch, "Cryptographic primitives for building secure and privacy respecting protocols," in ACM Conference on Computer and Communications Security, 2011, pp. 361-362.
-
(2011)
ACM Conference on Computer and Communications Security
, pp. 361-362
-
-
Camenisch, J.1
-
30
-
-
84945135810
-
An efficient system for nontransferable anonymous credentials with optional anonymity revocation
-
J. Camenisch and A. Lysyanskaya, "An efficient system for nontransferable anonymous credentials with optional anonymity revocation," in EUROCRYPT, 2001, pp. 93-118.
-
(2001)
EUROCRYPT
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
32
-
-
0346179738
-
Deniable encryption
-
R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky, "Deniable encryption," Cryptology ePrint Archive, Report 1996/002, 1996.
-
(1996)
Cryptology EPrint Archive, Report 1996/002
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
33
-
-
0032680807
-
Information hiding-a survey
-
IEEE, July
-
F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information Hiding-A Survey," in Proceedings of the IEEE (special issue on protection of multimedia content), vol. 87, no. 7. IEEE, July 1999, pp. 1062-1078.
-
(1999)
Proceedings of the IEEE (Special Issue on Protection of Multimedia Content)
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.1
Anderson, R.J.2
Kuhn, M.G.3
-
34
-
-
84885643619
-
Towards privacy-friendly transparency services in interorganizational business processes
-
M. Jensen, "Towards privacy-friendly transparency services in interorganizational business processes," in Computer Software and Applications Conference Workshops (COMPSACW), 2013, pp. 200-205.
-
(2013)
Computer Software and Applications Conference Workshops (COMPSACW)
, pp. 200-205
-
-
Jensen, M.1
-
35
-
-
79958014010
-
Towards displaying privacy information with icons
-
Springer
-
L.-E. Holtz, K. Nocun, and M. Hansen, "Towards displaying privacy information with icons," in Privacy and Identity Management for Life, ser. IFIP Advances in Information and Communication Technology, vol. 352. Springer, 2011, pp. 338-348.
-
(2011)
Privacy and Identity Management for Life, Ser. IFIP Advances in Information and Communication Technology
, vol.352
, pp. 338-348
-
-
Holtz, L.-E.1
Nocun, K.2
Hansen, M.3
-
36
-
-
84924243206
-
-
Ph. D. dissertation, Karlstad University, Department of Computer Science
-
T. Pulls, "Privacy-preserving transparency-enhancing tools," Ph.D. dissertation, Karlstad University, Department of Computer Science, 2012.
-
(2012)
Privacy-preserving Transparency-enhancing Tools
-
-
Pulls, T.1
-
37
-
-
84865486754
-
Transparency tools
-
J. Camenisch, S. Fischer-Hübner, and K. Rannenberg, Eds Springer
-
H. Hedbom, T. Pulls, and M. Hansen, "Transparency tools," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hübner, and K. Rannenberg, Eds. Springer, 2011, pp. 135-143.
-
(2011)
Privacy and Identity Management for Life
, pp. 135-143
-
-
Hedbom, H.1
Pulls, T.2
Hansen, M.3
-
39
-
-
84945902781
-
-
October, Privacy by Design Resolution. 27-29 October 2010, Jerusalem, Israel
-
32nd International Conference of Data Protection and Privacy Commissioners. (2010, October) Privacy by Design Resolution. 27-29 October 2010, Jerusalem, Israel. [Online]. Available: http: //www.ipc.on.ca/site documents/pbd-resolution.pdf
-
(2010)
32nd International Conference of Data Protection and Privacy Commissioners
-
-
-
40
-
-
50949085110
-
Addressing privacy requirements in system design: The pris method
-
Aug
-
C. Kalloniatis, E. Kavakli, and S. Gritzalis, "Addressing Privacy Requirements in System Design: The PriS Method," Requir. Eng., vol. 13, no. 3, pp. 241-255, Aug. 2008.
-
(2008)
Requir. Eng.
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
41
-
-
79952002261
-
A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
-
Mar
-
M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, "A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements," Requir. Eng., vol. 16, no. 1, pp. 3-32, Mar. 2011.
-
(2011)
Requir. Eng.
, vol.16
, Issue.1
, pp. 3-32
-
-
Deng, M.1
Wuyts, K.2
Scandariato, R.3
Preneel, B.4
Joosen, W.5
-
42
-
-
84884763869
-
-
Ph. D. dissertation, Department of Computer Science, KU Leuven, Belgium, May
-
S. F. Gürses, "Multilateral privacy requirements analysis in online social networks," Ph.D. dissertation, Department of Computer Science, KU Leuven, Belgium, May 2010.
-
(2010)
Multilateral Privacy Requirements Analysis in Online Social Networks
-
-
Gürses, S.F.1
-
44
-
-
84945912916
-
Standardisierte datenschutzmodellierung
-
M. Rost, "Standardisierte Datenschutzmodellierung," DuD-Datenschutz und Datensicherheit, vol. 36, no. 6, pp. 433-438, 2012.
-
(2012)
DuD-Datenschutz und Datensicherheit
, vol.36
, Issue.6
, pp. 433-438
-
-
Rost, M.1
-
45
-
-
84945931746
-
-
Bundesamt für Sicherheit in der Informationstechnik (German Federal Office for Information Security) BSI Standards
-
Bundesamt für Sicherheit in der Informationstechnik (German Federal Office for Information Security), "BSI Standard 100-2: IT-Grundschutz Methodology Version 2.0," BSI Standards, 2008. [Online]. Available: https://www.bsi.bund.de/SharedDocs/Downloads/ EN/BSI/Publications/BSIStandards/standard 100-2 e pdf
-
(2008)
BSI Standard 100-2: IT-Grundschutz Methodology Version 2. 0
-
-
-
46
-
-
84922583149
-
Generische Schutzmaßnahmen für Datenschutz-Schutzziele
-
T. Probst, "Generische Schutzmaßnahmen für Datenschutz-Schutzziele," DuD-Datenschutz und Datensicherheit, vol. 36, no. 6, pp. 439-444, 2012.
-
(2012)
DuD-Datenschutz und Datensicherheit
, vol.36
, Issue.6
, pp. 439-444
-
-
Probst, T.1
-
47
-
-
84945901798
-
-
DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE. (2012, January) The German AAL Standardization Roadmap (= Ambient Assisted Living)
-
DKE German Commission for Electrical, Electronic & Information Technologies of DIN and VDE. (2012, January) The German AAL Standardization Roadmap (= Ambient Assisted Living). [Online]. Available: http://www.vde.com/en/dke/std/Documents/German% 20AAL%20Standardization%20Roadmap%20%5B1%5D.pdf
-
-
-
-
50
-
-
84945937085
-
-
Conference of the Data Protection Commissioners of the Federal Government and the Länder and Düsseldorf Circle. (2012, June) Guideline for data-protection compliant smart metering
-
Conference of the Data Protection Commissioners of the Federal Government and the Länder and Düsseldorf Circle. (2012, June) Guideline for data-protection compliant smart metering. [Online]. Available: http://www.bfdi.bund.de/SharedDocs/ Publikationen/EN/NationaleDSK/GuidelineSmartMeter.pdf
-
-
-
-
51
-
-
84945904958
-
Deutschland-online kfz-wesen-teilprojekt xkfz standardisierung-xkfz-spezifikation, version 1. 0. 0
-
XKfz-Working Group
-
XKfz-Working Group, "Deutschland-Online Kfz-Wesen-Teilprojekt XKfz Standardisierung-XKfz-Spezifikation, Version 1.0.0," Ministerium des Innern, für Sport und Infrastruktur Rheinland-Pfalz, Tech. Rep., 2012. [Online]. Available: http://www.it-planungsrat.de/SharedDocs/Downloads/DE/Projekte/ Abgeschlossene Projekte/Kfz-Wesen/A6 Standardisierung XKfz Spezifikation.pdf? blob=publicationFile
-
(2012)
Ministerium des Innern, Für Sport und Infrastruktur Rheinland-Pfalz, Tech. Rep.
-
-
-
52
-
-
84945966255
-
-
IT-Planungsrat, ITPlanungsrat, Tech. Rep.
-
IT-Planungsrat, "Datenübertragung mit XTA (Version 2.0)," ITPlanungsrat, Tech. Rep., 2013. [Online]. Available: http://www.xoev. de/sixcms/media.php/13/Anlage2 XTA Spezifikation.6863.pdf
-
(2013)
Datenübertragung Mit XTA (Version 2. 0)
-
-
-
53
-
-
84865479777
-
Privacy protection goals and their implications for eid systems
-
Springer
-
H. Zwingelberg and M. Hansen, "Privacy Protection Goals and Their Implications for eID Systems," in Privacy and Identity Management for Life, ser. IFIP Advances in Information and Communication Technology, vol. 375. Springer, 2012, pp. 245-260.
-
(2012)
Privacy and Identity Management for Life, Ser. IFIP Advances in Information and Communication Technology
, vol.375
, pp. 245-260
-
-
Zwingelberg, H.1
Hansen, M.2
-
54
-
-
84945912133
-
-
Ph. D. dissertation, Gjøvik University College
-
E. Paintsil, "Privacy and security risks analysis of identity management systems," Ph.D. dissertation, Gjøvik University College, 2013. [Online]. Available: http://brage.bibsys.no/xmlui/bitstream/id/101881/ Thesis Electronic Version EbenezerPaintsil.pdf.pdf
-
(2013)
Privacy and Security Risks Analysis of Identity Management Systems
-
-
Paintsil, E.1
-
55
-
-
84945945671
-
-
October. Deliverable D1. 2. 4 of the TClouds Project
-
N. Marnau, M. Jensen, E. Schlehahn, R. Morte Ferrer, and M. Hansen. (2013, October) Cloud Computing-Data Protection Impact Assessment. Deliverable D1.2.4 of the TClouds Project. [Online]. Available: http://tclouds-project.eu/downloads/deliverables/TC-D1.2. 4-Cloud-Computing-Privacy-Impact-Assessment-V1.1-Public.pdf
-
(2013)
Cloud Computing-Data Protection Impact Assessment
-
-
Marnau, N.1
Jensen, M.2
Schlehahn, E.3
Morte Ferrer, R.4
Hansen, M.5
-
56
-
-
84945971690
-
-
Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing, 01037/12/EN, Article 29 Data Protection Working Party Std. WP 196, Adopted July 1st
-
Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing, 01037/12/EN, Article 29 Data Protection Working Party Std. WP 196, Adopted July 1st 2012. [Online]. Available: http://ec.europa.eu/justice/data-protection/article-29/ documentation/opinion-recommendation/files/2012/wp196 en.pdf
-
(2012)
-
-
|