-
1
-
-
77951144748
-
A survey of quantification of privacy preserving data mining algorithms
-
C. C. Aggarwal, P. S. Yu, and A. K. Elmagarmid, Orgs. Springer US
-
E. Bertino, D. Lin, and W. Jiang, "A Survey of Quantification of Privacy Preserving Data Mining Algorithms", in Privacy-Preserving Data Mining, vol. 34, C. C. Aggarwal, P. S. Yu, and A. K. Elmagarmid, Orgs. Springer US, pp. 183-205 (2008).
-
(2008)
Privacy-preserving Data Mining
, vol.34
, pp. 183-205
-
-
Bertino, E.1
Lin, D.2
Jiang, W.3
-
2
-
-
84926486372
-
Privacy design strategies
-
Marrakech, Morocco, June
-
Hoepman, J.-H. "Privacy Design Strategies". In Proceedings of 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2014, pp 446-459.
-
(2014)
Proceedings of 29th IFIP TC 11 International Conference, SEC 2014
, pp. 446-459
-
-
Hoepman, J.-H.1
-
4
-
-
84964229798
-
-
Accessed: 16-sep-2014
-
UML Profile Diagrams. [Online]. Available: http://www.umldiagrams.org/profile-diagrams.html [Accessed: 16-sep-2014].
-
-
-
UML Profile Diagrams1
-
7
-
-
84877888724
-
-
Version 1.3. OMG Document {formal/2012-06-01}. June
-
Object Management Group. OMG Systems Modeling Language (OMG SysML), Version 1.3. OMG Document {formal/2012-06-01}. June 2012.
-
(2012)
OMG Systems Modeling Language (OMG SysML)
-
-
-
8
-
-
79958003794
-
A conceptual model for privacy policies with consent and revocation requirements
-
M. Casassa Mont, S. Pearson, S. Creese, M. Goldsmith, N. Papanikolaou, "A Conceptual Model for Privacy Policies with Consent and Revocation Requirements", Privacy and Identity Management for Life. IFIP Advances in Information and Communication Technology Volume 352, 2011, pp 258-270.
-
(2011)
Privacy and Identity Management for Life. IFIP Advances in Information and Communication Technology
, vol.352
, pp. 258-270
-
-
Casassa Mont, M.1
Pearson, S.2
Creese, S.3
Goldsmith, M.4
Papanikolaou, N.5
-
10
-
-
34548016110
-
Privacy-aware role based access control
-
Sophia Antipolis, France, June 20-22, 2007, ACM, New York
-
Q. Ni, A. Trombetta, E. Bertino, J. Lobo. "Privacy-aware role based access control". Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (Sophia Antipolis, France, June 20-22, 2007). ACM, New York, pp. 41-50, 2007.
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 41-50
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
11
-
-
84944048132
-
The ponder policy specification language
-
N. Damianou, N. Dulay, E. Lupu, M. Sloman, "The Ponder Policy Specification Language", Policies for Distributed Systems and Networks Lecture Notes in Computer Science Volume 1995, 2001, pp 18-38.
-
(2001)
Policies for Distributed Systems and Networks Lecture Notes in Computer Science
, vol.1995
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
12
-
-
77957948780
-
The platform for privacy preferences 1.1 (p3p1.1) specification
-
L. Cranor, B. Dobbs, S. Egelman, G. Hogben, J. Humphrey, M. Langheinrich, M. Marchiori, M. Presler-Marshall, J. M. Reagle, M. Schunter, D. A. Stampley, and R. Wenning (2006). "The Platform for Privacy Preferences 1.1 (P3P1.1) Specification". World Wide Web Consortium NOTEP3P11-20061113.
-
(2006)
World Wide Web Consortium NOTEP3P11-20061113
-
-
Cranor, L.1
Dobbs, B.2
Egelman, S.3
Hogben, G.4
Humphrey, J.5
Langheinrich, M.6
Marchiori, M.7
Presler-Marshall, M.8
Reagle, J.M.9
Schunter, M.10
Stampley, D.A.11
Wenning, R.12
-
13
-
-
24944578141
-
-
Accessed: 23-mar-2015
-
P. Ashley, S. Hada, G. Karjoth, C. Powers, M. Schunter. "Enterprise Privacy Authorization Language (EPAL 1.2) ", 2003. [Online]. Available: http://www.zurich.ibm.com/security/enterpriseprivacy/epal/Specification/index.html. [Accessed: 23-mar-2015].
-
(2003)
Enterprise Privacy Authorization Language (EPAL 1.2)
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
14
-
-
80052161697
-
A survey of privacy policy languages
-
ACM
-
P. Kumaraguru, J. Lobo, L. F. Cranor, S. B. Calo, "A survey of privacy policy languages", Workshop on Usable IT Security Management (USM 07): Proceedings of the 3rd Symposium on Usable Privacy and Security, ACM, 2007.
-
(2007)
Workshop on Usable IT Security Management (USM 07): Proceedings of the 3rd Symposium on Usable Privacy and Security
-
-
Kumaraguru, P.1
Lobo, J.2
Cranor, L.F.3
Calo, S.B.4
-
17
-
-
70349921474
-
Metamodel for privacy policies within SOA
-
46, 19-19 May
-
D. S. Allison, H. F. El Yamany, M. A. M. Capretz. "Metamodel for privacy policies within SOA", Software Engineering for Secure Systems, 2009. SESS'09. ICSE Workshop on, vol., no., pp. 40, 46, 19-19 May 2009.
-
(2009)
Software Engineering for Secure Systems, 2009. SESS'09. ICSE Workshop on
, pp. 40
-
-
Allison, D.S.1
El Yamany, H.F.2
Capretz, M.A.M.3
-
20
-
-
0142165413
-
-
McGraw-Hill Ryerson Limited, Whitby, Ontario, Canada
-
A. Cavoukian, T. Hamilton. "The Privacy Payoff: How Successful Businesses Build Customer Trust", McGraw-Hill Ryerson Limited, Whitby, Ontario, Canada, 2002.
-
(2002)
The Privacy Payoff: How Successful Businesses Build Customer Trust
-
-
Cavoukian, A.1
Hamilton, T.2
-
24
-
-
84955491070
-
Requirements, design and evaluation of a privacy reference architecture for web applications and services
-
In press
-
th ACM/SIGAPP Symposium on Applied Computing, Salamanca, Spain, 2015. In press.
-
(2015)
th ACM/SIGAPP Symposium on Applied Computing, Salamanca, Spain
-
-
Basso, T.1
Moraes, R.2
Jino, M.3
Vieira, M.4
-
28
-
-
17744389340
-
A requirements taxonomy for reducing web site privacy vulnerabilities
-
A. I. Antón and J. B. Earp. A requirements taxonomy for reducing web site privacy vulnerabilities. Requirements Engineering, 9 (3) pp. 169-185, 2004.
-
(2004)
Requirements Engineering
, vol.9
, Issue.3
, pp. 169-185
-
-
Antón, A.I.1
Earp, J.B.2
-
29
-
-
84899022746
-
-
Accessed: 26-aug-2014
-
Google Privacy & Terms. "Privacy Policy", 2014. [Online]. Available: http://www.google.com/policies/privacy/[Accessed: 26-aug-2014].
-
(2014)
Privacy Policy
-
-
Google Privacy & Terms1
|