-
1
-
-
84995343298
-
-
http://eur-lex.europa.eu/LexUriServ/ LexUriServ.do?uri=COM:2012:0011:FIN: EN:PDF
-
-
-
-
2
-
-
84901634978
-
-
Privacy-by-Design
-
Privacy-by-Design, http://www.ipc.on.ca/english/Privacy/Introduction-to- PbD
-
-
-
-
3
-
-
84901588756
-
ICT and privacy: Barriers
-
Limassol, Cyprus, October 10-11(
-
Kung, A.: ICT and Privacy: Barriers. In: Annual Privacy Forum, Limassol, Cyprus, October 10-11( 2012
-
(2012)
Annual Privacy Forum
-
-
Kung, A.1
-
5
-
-
84886066391
-
-
Computers, Privacy &Data Protection
-
Gürses, S.F., Troncoso, C., Diaz, C.: Engineering Privacy-by-Design. Computers, Privacy &Data Protection (2011)
-
(2011)
Engineering Privacy-by-Design
-
-
Gürses, S.F.1
Troncoso, C.2
Diaz, C.3
-
6
-
-
80052748888
-
Privacy-by-design in ITS applications
-
Lucca, Italy (June 20
-
Kung, A., Freytag, J., Kargl, F.: Privacy-by-design in ITS applications. In: 2nd IEEE International Workshop on Data Security and Privacy in Wireless Networks, Lucca, Italy (June 20, 2011
-
(2011)
2nd IEEE International Workshop on Data Security and Privacy in Wireless Networks
-
-
Kung, A.1
Freytag, J.2
Kargl, F.3
-
8
-
-
84901603982
-
-
PIAF: Privacy Impact Assessment Framework
-
PIAF: Privacy Impact Assessment Framework, http://www.piafproject.eu
-
-
-
-
9
-
-
84901634979
-
-
CNIL methodology for privacy risk management
-
CNIL methodology for privacy risk management, http://www.cnil.fr/ fileadmin/ documents/en/CNIL-ManagingPrivacyRisks-Methodology.pdf
-
-
-
-
10
-
-
84901588619
-
-
EBIOS. Expression des Besoins et Identification des Objectifs de Sécurité
-
EBIOS. Expression des Besoins et Identification des Objectifs de Sécurité, http://www.ssi.gouv.fr/IMG/pdf/EBIOS-1- GuideMethodologique-2010-01-25.pdf
-
-
-
-
11
-
-
84901603847
-
-
OASIS. Organization for the Advancement of Structured Information
-
OASIS. Organization for the Advancement of Structured Information, https://www.oasis-open.org
-
-
-
-
12
-
-
84901603848
-
-
OASIS Privacy Management Reference Model (PMRM) Technical Committee
-
OASIS Privacy Management Reference Model (PMRM) Technical Committee, https://www.oasis-open.org/committees/pmrm/charter.php
-
-
-
-
13
-
-
79960549859
-
PriPAYD: Privacy-friendly pay-as-you-drive insurance
-
Troncoso, C., Danezis, G., Kosta, E., Balasch, J., Preneel, B.: PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance. IEEE Transactions on Dependable and Secure Computing 8(5), 742-755 (2011)
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.5
, pp. 742-755
-
-
Troncoso, C.1
Danezis, G.2
Kosta, E.3
Balasch, J.4
Preneel, B.5
-
14
-
-
84927651915
-
PrETP: Privacy-preserving electronic toll pricing (extended version
-
Balasch, J., Rial, A., Troncoso, C., Geuens, C., Preneel, B., Verbauwhede, I.: PrETP: Privacy-Preserving Electronic Toll Pricing (extended version). In: 19th USENIX Security Symposium
-
19th USENIX Security Symposium
-
-
Balasch, J.1
Rial, A.2
Troncoso, C.3
Geuens, C.4
Preneel, B.5
Verbauwhede, I.6
-
15
-
-
80955143493
-
Privacy-preserving smart metering
-
WPES, USA (October 17, 2011
-
Rial, A., Danezis, G.: Privacy-Preserving Smart Metering. In: Proceedings of the 2011 ACM Workshop on Privacy in the Electronic Society, WPES 2011, USA (October 17, 2011
-
(2011)
Proceedings of the 2011 ACM Workshop on Privacy in the Electronic Society
-
-
Rial, A.1
Danezis, G.2
-
16
-
-
84901603850
-
-
ISO/IEC/IEEE 42010:2011, Systems and software engineering - Architecture description
-
ISO/IEC/IEEE 42010:2011, Systems and software engineering - Architecture description
-
-
-
-
17
-
-
84901588618
-
-
Software Architecture Review and Assessment (SARA) Report, version 1.0, (February 2002
-
Software Architecture Review and Assessment (SARA) Report, version 1.0, http://kruchten.com/philippe/architecture/SARAv1.pdf (February 2002
-
-
-
-
18
-
-
84901619262
-
-
Software Architecture in Practice (3rd Edition), Len Bass, Paul Clementz, Rick Kazman. Addison-Wesley (2012)
-
Software Architecture in Practice (3rd Edition), Len Bass, Paul Clementz, Rick Kazman. Addison-Wesley (2012)
-
-
-
-
19
-
-
84995361640
-
Development and evaluation of emerging design patterns for ubiquitous computing
-
Chung, E., Hong, J., et al.: Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing. Patterns C1-C15, DIS2004 (2004)
-
(2004)
Patterns
, vol.C1C15
-
-
Chung, E.1
Hong, J.2
-
20
-
-
84995333617
-
-
http://www.privacypatterns.org
-
-
-
-
21
-
-
84995319335
-
-
http://www.teresa-project.org
-
-
-
-
22
-
-
51849136153
-
Restoring the patient control over her medical history
-
June
-
Anciaux, N., Benzine, M., Bouganim, L., Jacquemin, K., Pucheral, P., Yin, S.: Restoring the Patient Control over her Medical History. In: Proc. of the 21th IEEE International Symposium on Computer-Based Medical Systems (CBMS), Jyväskylä, Finland, pp. 132-137 (June 2008
-
(2008)
Proc. of the 21th IEEE International Symposium on Computer-Based Medical Systems (CBMS), Jyväskylä, Finland
, pp. 132-137
-
-
Anciaux, N.1
Benzine, M.2
Bouganim, L.3
Jacquemin, K.4
Pucheral, P.5
Yin, S.6
-
23
-
-
80053477353
-
Secure personal data servers: A vision paper
-
September
-
Allard, T., Anciaux, N., Bouganim, L., Guo, Y., Le Folgoc, L., Nguyen, B., Pucheral, P., Ray, I., Ray, I., Yin, S.: Secure Personal Data Servers: A Vision Paper. In: Proc. of the 36th International Conference on Very Large Data Bases (VLDB), Singapore, PVLDB 3(1), 25-35 (September 2010
-
(2010)
Proc. of the 36th International Conference on Very Large Data Bases (VLDB), Singapore, PVLDB
, vol.3
, Issue.1
, pp. 25-35
-
-
Allard, T.1
Anciaux, N.2
Bouganim, L.3
Guo, Y.4
Le Folgoc, L.5
Nguyen, B.6
Pucheral, P.7
Ray, I.8
Ray, I.9
Yin, S.10
-
24
-
-
84901634633
-
-
http://privacypatterns.org/
-
http://privacypatterns.org/, http://privacypatterns.org/patterns/ Location-granularity
-
-
-
-
25
-
-
0242674432
-
Hippocratic databases
-
Hong Kong (August
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases. In: 28th International Conference on Very Large Data Bases, Hong Kong (August 2002
-
(2002)
28th International Conference on Very Large Data Bases
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
26
-
-
84995323194
-
-
PRECIOSA, http://www.preciosa-project.org
-
-
-
-
27
-
-
84879538309
-
Mandatory enforcement of privacy policies using trusted computing principles
-
Stanford University (AAAI Spring Symposia) (March 2010
-
Kargl, F., Schaub, F., Dietzel, S.: Mandatory Enforcement of Privacy Policies Using Trusted Computing Principles. Intelligent Information Privacy Management Symposium, Stanford University (AAAI 2010 Spring Symposia) (March 2010
-
(2010)
Intelligent Information Privacy Management Symposium
-
-
Kargl, F.1
Schaub, F.2
Dietzel, S.3
-
28
-
-
84901588617
-
-
V2X Privacy Verifiable Architecture. Deliverable D7. Preciosa FP7 Project(November 2009
-
V2X Privacy Verifiable Architecture. Deliverable D7. Preciosa FP7 Project, http://www.preciosa-project.org/ (November 2009
-
-
-
-
30
-
-
84995319558
-
-
OVERSEE, https://www.oversee-project.com
-
-
-
-
31
-
-
84995353981
-
-
http://www.xtratum.org
-
-
-
-
32
-
-
84995353983
-
-
http://eur-lex.europa.eu/LexUriServ/ LexUriServ.do?uri=OJ:L:2010:207: FULL:EN:PDF
-
-
-
-
33
-
-
84995309297
-
-
http://pripare.eu/
-
-
-
|