메뉴 건너뛰기




Volumn 04-06-December-2014, Issue , 2014, Pages 559-570

Is privacy supportive for adaptive ICT systems?

Author keywords

Adaptive ICT system; Game theory; Identity management; IT risk management; Multilateral IT security; Privacy; Resilience; Security

Indexed keywords

DATA PRIVACY; GAME THEORY; INFORMATION ANALYSIS; INFORMATION MANAGEMENT; INFORMATION RETRIEVAL; REAL TIME SYSTEMS; RISK MANAGEMENT; SECURITY OF DATA; TIME SHARING SYSTEMS; TRANSPARENCY; WEB SERVICES; WEBSITES; WORLD WIDE WEB;

EID: 84985905858     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2684200.2684363     Document Type: Conference Paper
Times cited : (4)

References (76)
  • 2
    • 84875384473 scopus 로고    scopus 로고
    • A secure log architecture to support remote auditing
    • (April 2013)
    • Accorsi, R. 2013. A secure log architecture to support remote auditing. MATH COMPUT MODEL, 57, 7-8 (April 2013). 1578-1591. DOI=http://dx.doi.org/10.1016/j.mcm.2012.06.035.
    • (2013) Math Comput Model , vol.57 , Issue.7-8 , pp. 1578-1591
    • Accorsi, R.1
  • 3
    • 84856536487 scopus 로고    scopus 로고
    • Automated certification for compliant cloud-based business processes
    • (June 2011)
    • Accorsi, R., Lowis, L., and Sato, Y. 2011. Automated Certification for Compliant Cloud-based Business Processes. BISE, 3, 3 (June 2011), 145-154. DOI=http://dx.doi.org/10.1007/s12599-011-0155-7.
    • (2011) BISE , vol.3 , Issue.3 , pp. 145-154
    • Accorsi, R.1    Lowis, L.2    Sato, Y.3
  • 4
    • 57849117582 scopus 로고    scopus 로고
    • Compliance monitor for early warning risk determination
    • (October 2008)
    • Accorsi, R., Sato, Y., and Kai, S. 2008. Compliance Monitor for Early Warning Risk Determination. WIRTSCHAFTSINFORMATIK, 50, 5 (October 2008), 375-382. DOI=http://dx.doi.org/10.1007/s11576-008-0079-0.
    • (2008) WIRTSCHAFTSINFORMATIK , vol.50 , Issue.5 , pp. 375-382
    • Accorsi, R.1    Sato, Y.2    Kai, S.3
  • 6
    • 12344308304 scopus 로고    scopus 로고
    • Basic concepts and taxonomy of dependable and secure computing
    • (January 2004)
    • Avizienis, A., Laprie, J.-C., Randell, B., and Landwehr, C. 2004. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE T DEPEND SECURE, 1, 1 (January 2004), 11-33. DOI=http://dx.doi.org/10.1109/TDSC.2004.2.
    • (2004) IEEE T Depend Secure , vol.1 , Issue.1 , pp. 11-33
    • Avizienis, A.1    Laprie, J.-C.2    Randell, B.3    Landwehr, C.4
  • 8
    • 84867136631 scopus 로고    scopus 로고
    • Poisoning attacks against support vector machines
    • (Edinburgh, Scotland, June 26-July 1, 2012). ICML 2012. Omnipress
    • th Int. Conf. on Machine Learning, (Edinburgh, Scotland, June 26-July 1, 2012). ICML 2012. Omnipress, 1807-1814.
    • (2012) th Int. Conf. on Machine Learning , pp. 1807-1814
    • Biggio, B.1    Nelson, B.2    Laskov, P.3
  • 9
    • 0029700344 scopus 로고    scopus 로고
    • Decentralized trust management
    • (Oakland, CA, USA, May 6-8, 1996). IEEE SSP 1996. IEEE
    • Blaze, M., Feigenbaum, J., and Lacy, J.O. 1996. Decentralized Trust Management. In Proc. of IEEE Symp. on Security and Privacy (Oakland, CA, USA, May 6-8, 1996). IEEE SSP 1996. IEEE, 164-173. DOI=http://dx.doi.org/10.1109/SECPRI.1996.502679.
    • (1996) Proc. of IEEE Symp. on Security and Privacy , pp. 164-173
    • Blaze, M.1    Feigenbaum, J.2    Lacy, J.O.3
  • 13
    • 79960570447 scopus 로고    scopus 로고
    • Why and where: A characterization of data provenance
    • (London, UK, January 4-6, 2001). ICDT 2001. Springer
    • th Int. Conf. Database Theory (London, UK, January 4-6, 2001). ICDT 2001. Springer, 316-330. DOI=http://dx.doi.org/10.1007/3-540-44503-X-20.
    • (2001) th Int. Conf. Database Theory , pp. 316-330
    • Buneman, P.1    Khanna, S.2    Tan, W.C.3
  • 14
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • (Innsbruck, Austria, May 6-10, 2011). EUROCRYPT 2001. Springer
    • Camenisch, J. and Lysyanskaya, A. 2001. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In Proc. of Int. Conf. on the Theory and Application of Cryptographic Techniques Advances in Cryptology (Innsbruck, Austria, May 6-10, 2011). EUROCRYPT 2001. Springer, 93-118. DOI=http://dx.doi.org/10.1007/3-540-44987-6-7.
    • (2001) Proc. of Int. Conf. on the Theory and Application of Cryptographic Techniques Advances in Cryptology , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 15
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • (Santa Barbara, CA, USA, August 18-22, 2002). CRYPTO 2002. Springer
    • nd Annual Int. Cryptology Conf. Advances in Cryptology (Santa Barbara, CA, USA, August 18-22, 2002). CRYPTO 2002. Springer, 61-76. DOI=http://dx.doi.org/10.1007/3-540-45708-9-5.
    • (2002) nd Annual Int. Cryptology Conf. Advances in Cryptology , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 16
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Chaum, D. 1985. Security Without Identification: Transaction Systems to Make Big Brother Obsolete. COMMUN ACM, 28, 10, 1030-1044. DOI=http://dx.doi.org/10.1145/4372.4373.
    • (1985) Commun ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 18
    • 84985929597 scopus 로고    scopus 로고
    • (request for a preliminary ruling from the Audiencia Nacional - Spain) - Google Spain SL, Google Inc. v Agencia Espanola de Proteccion de Datos (AEPD), Mario Costeja Gonzalez (Case C-131/12)
    • Court of Justice of the European Union. 2014. Judgment of the Court (Grand Chamber) of 13 May 2014 (request for a preliminary ruling from the Audiencia Nacional - Spain) - Google Spain SL, Google Inc. v Agencia Espanola de Proteccion de Datos (AEPD), Mario Costeja Gonzalez (Case C-131/12).
    • (2014) Judgment of the Court (Grand Chamber) of 13 May 2014
  • 19
    • 84904546940 scopus 로고    scopus 로고
    • Secure provision of patient-centered health information technology services in public networks - Leveraging security and privacy features provided by the German nationwide health information technology infrastructure
    • (June 2014)
    • Dehling, T. and Sunyaev, A. 2014. Secure provision of patient-centered health information technology services in public networks - leveraging security and privacy features provided by the German nationwide health information technology infrastructure. ELECTRONIC MARKETS, 24, 2 (June 2014), 89-99. DOI=http://dx.doi.org/10.1007/s12525-013-0150-6.
    • (2014) Electronic Markets , vol.24 , Issue.2 , pp. 89-99
    • Dehling, T.1    Sunyaev, A.2
  • 22
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • (March 1983)
    • Dolev, D. and Yao, A.C. 1983. On the Security of Public Key Protocols. IEEE T INFORM THEORY, 29, 2 (March 1983), 198-208. DOI=http://dx.doi.org/10.1109/TIT.1983.1056650.
    • (1983) IEEE T Inform Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 23
    • 84904549775 scopus 로고    scopus 로고
    • Directive 2009/140/EC of the European Parliament and of the Council of 25 November 2009 amending directives 2002/21/EC on a common regulatory framework for electronic communications networks and services
    • European Commission. 2009. Directive 2009/140/EC of the European Parliament and of the Council of 25 November 2009 amending Directives 2002/21/EC on a common regulatory framework for electronic communications networks and services. Official Journal of the European Communities, L 337, 37-69.
    • (2009) Official Journal of the European Communities , vol.L 337 , pp. 37-69
  • 25
    • 84919783003 scopus 로고    scopus 로고
    • REGULATION (EU) no 575/2013 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 26 June 2013 on prudential requirements for credit institutions and investment forms and amending regulation (EU) no 648/2012
    • L 176
    • European Commission. 2013. REGULATION (EU) No 575/2013 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 26 June 2013 on prudential requirements for credit institutions and investment forms and amending Regulation (EU) No 648/2012. Official Journal of the European Union, L 176/1-337.
    • (2013) Official Journal of the European Union , pp. 1-337
  • 26
    • 84954115676 scopus 로고    scopus 로고
    • DIRECTIVE 2013/36/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 26 June 2013 on access to the activity of credit institutions and the prudential supervision of credit institutions and investment firms, amending directive 2002/87/EC and repealing directives 2006/48/EC and 2006/49/EC
    • L 176
    • European Commission. 2013. DIRECTIVE 2013/36/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 26 June 2013 on access to the activity of credit institutions and the prudential supervision of credit institutions and investment firms, amending Directive 2002/87/EC and repealing Directives 2006/48/EC and 2006/49/EC. Official Journal of the European Union, L 176/338-436.
    • (2013) Official Journal of the European Union , pp. 338-436
  • 28
    • 33749049616 scopus 로고    scopus 로고
    • An optimization model for the management of security risks in banking companies
    • (Munich, Germany, July 19-22, 2005). CEC'05. IEEE
    • th IEEE Int. Conf. on E-Commerce Technology (Munich, Germany, July 19-22, 2005). CEC'05. IEEE, 266-273. DOI=http://dx.doi.org/10.1109/ICECT.2005.21.
    • (2005) th IEEE Int. Conf. on E-Commerce Technology , pp. 266-273
    • Faisst, U.1    Prokein, O.2
  • 29
    • 0022045868 scopus 로고
    • Impossibility of distributed consensus with one faulty process
    • (April 1985)
    • Fischer, M.J., Lynch, N.A., and Paterson, M.S. 1985. Impossibility of distributed consensus with one faulty process. J ACM, 32, 2 (April 1985), 374-382. DOI=http://dx.doi.org/10.1145/3149.214121.
    • (1985) J ACM , vol.32 , Issue.2 , pp. 374-382
    • Fischer, M.J.1    Lynch, N.A.2    Paterson, M.S.3
  • 32
    • 84904557205 scopus 로고    scopus 로고
    • On the design of a privacy aware authorization engine for collaborative environments
    • (June 2014)
    • Gogoulos, F.I., Antonakopoulou, A., Lioudakis, G.V., Mousas, A.S., Kaklamani, D.I., and Venieris, I.S. 2014. On the design of a privacy aware authorization engine for collaborative environments. ELECTRONIC MARKETS, 24, 2 (June 2014), 101-112. DOI=http://dx.doi.org/10.1007/s12525-014-0155-9.
    • (2014) Electronic Markets , vol.24 , Issue.2 , pp. 101-112
    • Gogoulos, F.I.1    Antonakopoulou, A.2    Lioudakis, G.V.3    Mousas, A.S.4    Kaklamani, D.I.5    Venieris, I.S.6
  • 34
    • 84948675653 scopus 로고    scopus 로고
    • Insurability of electronic commerce risks
    • (Hawaii, USA, January 7-10, 2002). HICCS'02. IEEE
    • th Annual Hawaii International Conference on System Sciences 7(7) (Hawaii, USA, January 7-10, 2002). HICCS'02. IEEE, 185-193. DOI=http://dx.doi.org/10.1109/HICSS.2002.994177.
    • (2002) th Annual Hawaii International Conference on System Sciences , vol.7 , Issue.7 , pp. 185-193
    • Grzebiela, T.1
  • 35
    • 33745329295 scopus 로고    scopus 로고
    • Computability classes for enforcement mechanisms
    • (January 2006)
    • Hamlen, K.W., Morrisett, G., and Schneider, F.B. 2006. Computability Classes for Enforcement Mechanisms. ACM T PROG LANG SYS, 28, 1 (January 2006), 175-205. DOI=http://dx.doi.org/10.1145/1111596.1111601.
    • (2006) ACM T Prog Lang Sys , vol.28 , Issue.1 , pp. 175-205
    • Hamlen, K.W.1    Morrisett, G.2    Schneider, F.B.3
  • 36
    • 0034842250 scopus 로고    scopus 로고
    • Understanding the complexity of economic, ecological, and social systems
    • Holling, C.S. 2001. Understanding the Complexity of Economic, Ecological, and Social Systems. ECOSYSTEMS, 4, 5, 390-405. DOI=http://dx.doi.org/10.1007/s10021-001-0101-5.
    • (2001) Ecosystems , vol.4 , Issue.5 , pp. 390-405
    • Holling, C.S.1
  • 40
    • 84949501863 scopus 로고    scopus 로고
    • Usability meets security - The identity-manager as your personal security assistant for the internet
    • (New Orleans, LA, USA, December 11-15, 2000). ACSAC'00. IEEE
    • th Annual Computer Security Applications Conf. (New Orleans, LA, USA, December 11-15, 2000). ACSAC'00. IEEE, 344-353. DOI=http://dx.doi.org/10.1109/ACSAC.2000.898889.
    • (2000) th Annual Computer Security Applications Conf , pp. 344-353
    • Jendricke, U.1    Gerd Tom Markotten, D.2
  • 41
    • 84856552582 scopus 로고    scopus 로고
    • Secure and sustainable benchmarking in clouds
    • (June 2011)
    • Kerschbaum, F. 2011. Secure and Sustainable Benchmarking in Clouds. BISE, 3, 3 (June 2011), 135-143. DOI=http://dx.doi.org/10.1007/s12599-011-0153-9.
    • (2011) BISE , vol.3 , Issue.3 , pp. 135-143
    • Kerschbaum, F.1
  • 42
    • 84904502063 scopus 로고    scopus 로고
    • An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata
    • (June 2014)
    • Kieseberg, P., Schrittwieser, S., Mulazzani, M., Echizen, I., and Weippl, E. 2014. An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. ELECTRONIC MARKETS, 24, 2 (June 2014), 113-124. DOI=http://dx.doi.org/10.1007/s12525-014-0154-x.
    • (2014) Electronic Markets , vol.24 , Issue.2 , pp. 113-124
    • Kieseberg, P.1    Schrittwieser, S.2    Mulazzani, M.3    Echizen, I.4    Weippl, E.5
  • 43
    • 57849097281 scopus 로고    scopus 로고
    • Towards systematic achievement of compliance in service-oriented architectures: The MASTER approach
    • (October 2008)
    • Lotz, V., Pigout, E., Fischer, P.M., Kossmann, D., Massacci, F., and Pretschner, A. Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach. WIRTSCHAFTSINFORMATIK, 50, 5 (October 2008), 383-391. DOI=http://dx.doi.org/10.1007/s11576-008-0086-1.
    • WIRTSCHAFTSINFORMATIK , vol.50 , Issue.5 , pp. 383-391
    • Lotz, V.1    Pigout, E.2    Fischer, P.M.3    Kossmann, D.4    Massacci, F.5    Pretschner, A.6
  • 44
    • 33646061645 scopus 로고    scopus 로고
    • Modeling public key infrastructures in the real world
    • (Canterbury, UK, June 30-July 1, 2005). EuroPKI 2005. Springer
    • nd European PKI Workshop: Research and Applications (Canterbury, UK, June 30-July 1, 2005). EuroPKI 2005. Springer, 118-134. DOI=http://dx.doi.org/10.1007/11533733-8.
    • (2005) nd European PKI Workshop: Research and Applications , pp. 118-134
    • Marchesini, J.1    Smith, S.2
  • 46
    • 84947294004 scopus 로고    scopus 로고
    • Modeling a public-key infrastructure
    • (Rome, Italy, September 25-27, 1996). ESORICS 96. Springer
    • th European Symposium on Research in Computer Science (Rome, Italy, September 25-27, 1996). ESORICS 96. Springer, 325-350. DOI=http://dx.doi.org/10.1007/3-540-61770-1-45.
    • (1996) th European Symposium on Research in Computer Science , pp. 325-350
    • Maurer, U.1
  • 47
    • 48249085695 scopus 로고    scopus 로고
    • Investing in the IT that makes a competitive difference
    • (July 2008)
    • McAfee, A. and Brynjolfsson, E. 2008. Investing in the IT That Makes a Competitive Difference. HARVARD BUS REV (July 2008).
    • (2008) Harvard Bus Rev
    • McAfee, A.1    Brynjolfsson, E.2
  • 50
    • 84893355082 scopus 로고    scopus 로고
    • Why are business processes not secure?
    • Springer
    • th Birthday. Springer, 240-254. DOI=http://dx.doi.org/10.1007/978-3-642-42001-6-17.
    • (2014) th Birthday , pp. 240-254
    • Müller, G.1    Accorsi, R.2
  • 52
    • 0000291018 scopus 로고
    • The bargaining problem
    • (April 1950)
    • Nash, J. 1950. The Bargaining Problem. ECONOMETRICA, 18, 2 (April 1950), 155-162. DOI=http://dx.doi.org/10.2307/1907266.
    • (1950) Econometrica , vol.18 , Issue.2 , pp. 155-162
    • Nash, J.1
  • 53
    • 84971147730 scopus 로고
    • Non-cooperative games
    • (September 1951)
    • Nash, J. 1951. Non-Cooperative Games. ANN MATH, 54, 2 (September 1951), 286-295. DOI=http://dx.doi.org/10.2307/1969529.
    • (1951) Ann Math , vol.54 , Issue.2 , pp. 286-295
    • Nash, J.1
  • 54
    • 0001058478 scopus 로고
    • Two-person cooperative games
    • (January 1953)
    • Nash, J. 1953. Two-Person Cooperative Games. ECONOMETRICA, 21, 1 (January 1953), 128-140. DOI=http://dx.doi.org/10.2307/1906951.
    • (1953) Econometrica , vol.21 , Issue.1 , pp. 128-140
    • Nash, J.1
  • 56
    • 84946125131 scopus 로고    scopus 로고
    • Service-oriented computing: Concepts, characteristics and directions
    • (Roma, Italy, December 10-12, 2003). WISE'03. IEEE
    • th Int. Conf. on Web Information Systems Engineering (Roma, Italy, December 10-12, 2003). WISE'03. IEEE, 3-12. DOI=http://dx.doi.org/10.1109/WISE.2003.1254461.
    • (2003) th Int. Conf. on Web Information Systems Engineering , pp. 3-12
    • Papazoglou, M.P.1
  • 58
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • (April 1980)
    • Pease, M., Shostak, R., and Lamport, L. 1980. Reaching Agreement in the Presence of Faults. J ACM, 27, 2 (April 1980), 228-234. DOI=http://dx.doi.org/10.1145/322186.322188.
    • (1980) J ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 59
    • 85008202321 scopus 로고
    • Unconditional byzantine agreement for any number of faulty processes
    • (Cachan, France, February 13-15, 1992). STACS '92. Springer
    • th Annual Symp. on Theoretical Aspects of Computer Science (Cachan, France, February 13-15, 1992). STACS '92. Springer, 339-350. DOI=http://dx.doi.org/10.1007/3-540-55210-3-195.
    • (1992) th Annual Symp. on Theoretical Aspects of Computer Science , pp. 339-350
    • Pfitzmann, B.1    Waidner, M.2
  • 60
    • 33748543201 scopus 로고    scopus 로고
    • Distributed usage control
    • (September 2006)
    • Pretschner, A., Hilty, M., and Basin, D. 2006. Distributed usage control. COMMUN ACM, 49, 9 (September 2006). 39-44. DOI=http://dx.doi.org/10.1145/1151030.1151053.
    • (2006) Commun ACM , vol.49 , Issue.9 , pp. 39-44
    • Pretschner, A.1    Hilty, M.2    Basin, D.3
  • 61
    • 84939474509 scopus 로고    scopus 로고
    • Technical Report. Strategic Headquarters for the Promotion of an Advanced Information and Telecommunications Network Society
    • Prime Minister of Japan and His Cabinet. 2013. Declaration to be the World's Most Advanced IT Nation. Technical Report. Strategic Headquarters for the Promotion of an Advanced Information and Telecommunications Network Society.
    • (2013) Declaration to be the World's Most Advanced IT Nation
  • 63
    • 33746637552 scopus 로고    scopus 로고
    • An algebra for enterprise privacy policies closed under composition and conjunction
    • (Freiburg, Germany, June 6-9, 2006). ETRICS 2006. Springer
    • Raub, D. and Steinwandt, R. 2006. An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. In Proc. of the Int. Conf. on Emerging Trends in Information and Communication Security (Freiburg, Germany, June 6-9, 2006). ETRICS 2006. Springer, 130-144. DOI=http://dx.doi.org/10.1007/11766155-10.
    • (2006) Proc. of the Int. Conf. on Emerging Trends in Information and Communication Security , pp. 130-144
    • Raub, D.1    Steinwandt, R.2
  • 64
    • 84904548576 scopus 로고    scopus 로고
    • Take care of your belongings today - Securing accessibility to complex electronic business processes
    • (June 2014)
    • Rechert, K., von Suchodoletz, D., Valizada, I., Latocha, J., Cardena, T.J., and Kulzhabayev, A. 2014. Take care of your belongings today - securing accessibility to complex electronic business processes. ELECTRONIC MARKETS, 24, 2 (June 2014), 125-134. DOI=http://dx.doi.org/10.1007/s12525-013-0151-5.
    • (2014) Electronic Markets , vol.24 , Issue.2 , pp. 125-134
    • Rechert, K.1    Von Suchodoletz, D.2    Valizada, I.3    Latocha, J.4    Cardena, T.J.5    Kulzhabayev, A.6
  • 66
    • 57849129576 scopus 로고    scopus 로고
    • ExPDT: Ein policy-basierter ansatz zur automatisierung von compliance
    • (October 2008)
    • Sackmann, S. and Kähmer, M. 2008. ExPDT: Ein Policy-basierter Ansatz zur Automatisierung von Compliance. WIRTSCHAFTSINFORMATIK, 50, 5 (October 2008). 366-374. DOI=http://dx.doi.org/10.1007/s11576-008-0078-1.
    • (2008) Wirtschaftsinformatik , vol.50 , Issue.5 , pp. 366-374
    • Sackmann, S.1    Kähmer, M.2
  • 67
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in mutics
    • (July 1974)
    • Saltzer, J.H. 1974. Protection and the control of information sharing in mutics. COMMUN ACM 17, 7 (July 1974), 388-402. DOI=http://dx.doi.org/10.1145/361011.361067.
    • (1974) Commun ACM , vol.17 , Issue.7 , pp. 388-402
    • Saltzer, J.H.1
  • 70
    • 84856298176 scopus 로고    scopus 로고
    • Isolation in cloud computing and privacy-enhancing technologies - Suitability of privacy-enhancing technologies for separating data usage in business processes
    • (June 2011)
    • Sonehara, N., Echizen, I., and Wohlgemuth, S. 2011. Isolation in Cloud Computing and Privacy-Enhancing Technologies - Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes. BISE, 3, 3 (June 2011), 155-162. DOI=http://dx.doi.org/10.1007/s12599-011-0160-x.
    • (2011) BISE , vol.3 , Issue.3 , pp. 155-162
    • Sonehara, N.1    Echizen, I.2    Wohlgemuth, S.3
  • 71
    • 77953248995 scopus 로고    scopus 로고
    • Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
    • (June 2010)
    • Sterbenz, J.P.G., Hutchison, D., Cetinkaya, E.K., Jabbar, A., Rohrer, J.P., Schöller, M., and Smith, P. 2010. Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines, COMPUT NETW, 54, 8 (June 2010), 1245-1265. DOI=http://dx.doi.org/10.1016/j.comnet.2010.03.005.
    • (2010) Comput Netw , vol.54 , Issue.8 , pp. 1245-1265
    • Sterbenz, J.P.G.1    Hutchison, D.2    Cetinkaya, E.K.3    Jabbar, A.4    Rohrer, J.P.5    Schöller, M.6    Smith, P.7
  • 74
    • 84928553106 scopus 로고    scopus 로고
    • Adaptive user-centered security
    • (Fribourg, Switzerland, September 8-12, 2014), CD-ARES 2014. SeCIHD 2014. Springer
    • th Int. Workshop on Security and Cognitive Informatics for Homeland Defense (Fribourg, Switzerland, September 8-12, 2014), CD-ARES 2014. SeCIHD 2014. Springer, 91-109. DOI=http://dx.doi.org/10.1007/978-3-319-10975-6-7.
    • (2014) th Int. Workshop on Security and Cognitive Informatics for Homeland Defense , pp. 91-109
    • Wohlgemuth, S.1
  • 76
    • 33746632946 scopus 로고    scopus 로고
    • Privacy with delegation of rights by identity management
    • (Freiburg, Germany, June 6-9, 2006). ETRICS 2006. Springer
    • Wohlgemuth, S. and Müller, G. 2006. Privacy with Delegation of Rights by Identity Management. In Proc. of the Int. Conf. on Emerging Trends in Information and Communication Security (Freiburg, Germany, June 6-9, 2006). ETRICS 2006. Springer, 175-190. DOI=http://dx.doi.org/10.1007/11766155-13.
    • (2006) Proc. of the Int. Conf. on Emerging Trends in Information and Communication Security , pp. 175-190
    • Wohlgemuth, S.1    Müller, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.