-
1
-
-
77951144748
-
A survey of quantification of privacy preserving data mining algorithms
-
C. C. Aggarwal, P. S. Yu, and A. K. Elmagarmid, Orgs. Springer US
-
E. Bertino, D. Lin, and W. Jiang, "A Survey of Quantification of Privacy Preserving Data Mining Algorithms", in Privacy-Preserving Data Mining, vol. 34, C. C. Aggarwal, P. S. Yu, and A. K. Elmagarmid, Orgs. Springer US, pp. 183-205 (2008).
-
(2008)
Privacy-Preserving Data Mining
, vol.34
, pp. 183-205
-
-
Bertino, E.1
Lin, D.2
Jiang, W.3
-
2
-
-
84955492667
-
-
[Accessed: 17-aug-2014
-
"Lawmakers Go After Carrier IQ Over Privacy Concerns". [Online]. Available: http://www.adweek.com/news/technology/lawmakers-goafter-carrier-iq-over-privacy-concerns-136880. [Accessed: 17-aug-2014].
-
Lawmakers Go after Carrier IQ over Privacy Concerns
-
-
-
3
-
-
85020149810
-
-
[Accessed: 17-aug-2014
-
"Austrian Law Student Faces Down Facebook". [Online]. Available: http://www.nytimes.com/2012/02/06/technology/06ihtrawdata06.html?pagewanted=all&-r=0. [Accessed: 17-aug-2014].
-
Austrian Law Student Faces Down Facebook
-
-
-
4
-
-
84870707765
-
Ramodel: A reference model for reference architectures
-
E. Y. Nakagawa, F. Oquendo, M. Becker. "RAModel: A Reference Model for Reference Architectures," Joint Working IEEE/IFIP Conference on Software Architecture (WICSA) and European Conference on Software Architecture (ECSA), 2012, pp.297-301, 20-24 (2012).
-
(2012)
Joint Working IEEE/IFIP Conference on Software Architecture (WICSA) and European Conference on Software Architecture (ECSA
, vol.2012
, Issue.20-24
, pp. 297-301
-
-
Nakagawa, E.Y.1
Oquendo, F.2
Becker, M.3
-
5
-
-
52049103355
-
An e-contracting reference architecture
-
S. Angelov, P. Grefen. "An e-contracting reference architecture". J. Syst. Softw. 81, 11, pp. 1816-1844 (2008).
-
(2008)
J. Syst. Softw
, vol.81
, Issue.11
, pp. 1816-1844
-
-
Angelov, S.1
Grefen, P.2
-
8
-
-
80052408805
-
Privacy reference architecture for personal information life cycle
-
T. Kim, H. Adeli, R. J. Robles, e M. Balitanas, Orgs. Springer Berlin Heidelberg
-
Y-N Shin, W. B. Chun, H. S. Jung, M. G. Chun. "Privacy Reference Architecture for Personal Information Life Cycle", in Advanced Communication and Networking, T. Kim, H. Adeli, R. J. Robles, e M. Balitanas, Orgs. Springer Berlin Heidelberg, pp. 76-85 (2011).
-
(2011)
Advanced Communication and Networking
, pp. 76-85
-
-
Shin, Y.-N.1
Chun, W.B.2
Jung, H.S.3
Chun, M.G.4
-
10
-
-
84955513309
-
-
[Accessed: 25-sep-2014
-
Authors removed for double-blind review. [Online]. Available: https://drive.google.com/folderview?id=0B9BaE1C-TUPfdlRkMndCdXprNjg&usp=drive-web. [Accessed: 25-sep-2014].
-
Authors Removed for Double-blind Review
-
-
-
11
-
-
67650080222
-
Towards privacy taxonomy-based attack tree analysis for the protection of consumer information privacy
-
K. Reddy, H. S. Venter, M. Olivier, I. Currie. "Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy," Sixth Annual Conference on Privacy, Security and Trust, 2008. PST '08., pp.56,64, 1-3 (2008).
-
(2008)
Sixth Annual Conference on Privacy, Security and Trust, 2008. PST '08
, vol.64
, Issue.56
, pp. 1-3
-
-
Reddy, K.1
Venter, H.S.2
Olivier, M.3
Currie, I.4
-
12
-
-
17744389340
-
A requirements taxonomy for reducing web site privacy vulnerabilities
-
A. I. Antón and J. B. Earp. A requirements taxonomy for reducing web site privacy vulnerabilities. Requirements Engineering, 9(3) pp.169-185 (2004).
-
(2004)
Requirements Engineering
, vol.9
, Issue.3
, pp. 169-185
-
-
Antón, A.I.1
Earp, J.B.2
-
15
-
-
84955483029
-
IBM tivoli privacy manager. Solution design and best practices
-
A. Bücker, B. Haase, D. Moore, M. Keller, O. Kobinger, H-F. Wu. "IBM Tivoli Privacy Manager. Solution Design and Best Practices". IBM Redbooks (2003).
-
(2003)
IBM Redbooks
-
-
Bücker, A.1
Haase, B.2
Moore, D.3
Keller, M.4
Kobinger, O.5
Wu, H.-F.6
-
17
-
-
62949210706
-
Privacy with web services: Intelligence gathering and enforcement
-
9-12
-
P. Bodorik, D. Jutla. "Privacy with Web Services: Intelligence Gathering and Enforcement". EEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008. WI-IAT '08. I, vol.3, pp.546,549, 9-12 (2008).
-
(2008)
EEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008. WI-IAT '08. i
, vol.3
, pp. 546-549
-
-
Bodorik, P.1
Jutla, D.2
-
19
-
-
84955460190
-
-
[Accessed: 18-aug-2014
-
"Web Browser Secure Settings" [Online]. Available: http://its.ucsc.edu/software/release/browser-secure.html [Accessed: 18-aug-2014].
-
Web Browser Secure Settings
-
-
-
21
-
-
85041431588
-
Hails: Protecting data privacy in untrusted web applications
-
Berkeley, CA, USA
-
D. B. Giffin, A. Levy, D. Stefan, D. Terei, D. Mazières, J. C. Mitchell, and A. Russo. "Hails: protecting data privacy in untrusted web applications." In Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation (OSDI'12), Berkeley, CA, USA, 47-60, 2012.
-
(2012)
Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12
, pp. 47-60
-
-
Giffin, D.B.1
Levy, A.2
Stefan, D.3
Terei, D.4
Mazières, D.5
Mitchell, J.C.6
Russo, A.7
-
22
-
-
80053169173
-
Enhancing penetration testing with attack signatures and interface monitoring for the detection of injection vulnerabilities in web services
-
N. Antunes, M. Vieira. "Enhancing Penetration Testing with Attack Signatures and Interface Monitoring for the Detection of Injection Vulnerabilities in Web Services," IEEE International Conference on Services Computing (SCC), pp.104-111, (2011).
-
(2011)
IEEE International Conference on Services Computing (SCC
, pp. 104-111
-
-
Antunes, N.1
Vieira, M.2
-
24
-
-
19344364618
-
Role-based access control
-
Elsevier
-
R. S. Sandhu, "Role-based Access Control", in Advances in Computers, vol. Volume 46, Elsevier, p. 237-286 (1998).
-
(1998)
Advances in Computers
, vol.46
, pp. 237-286
-
-
Sandhu, R.S.1
-
26
-
-
84886059158
-
-
[Accessed: 02-aug-2014
-
"How PGP Works". [Online]. Available: http://www.pgpi.org/doc/pgpintro/[Accessed: 02-aug-2014].
-
How PGP Works
-
-
-
27
-
-
84858098605
-
-
[Accessed: 01-aug-2014
-
"Shibboleth". [Online]. Available: http://shibboleth.net/[Accessed: 01-aug-2014].
-
Shibboleth
-
-
-
28
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information
-
ACM, New York, NY, USA
-
P. Samarati, L. Sweeney. "Generalizing data to provide anonymity when disclosing information". In Proceedings of the seventeenth ACM symposium on Principles of database systems (PODS '98). ACM, New York, NY, USA, pp. 188 (1998).
-
(1998)
Proceedings of the Seventeenth ACM Symposium on Principles of Database Systems (PODS '98
, pp. 188
-
-
Samarati, P.1
Sweeney, L.2
|