-
1
-
-
84972531331
-
Enhancing access to microdata while protecting confidentiality: Prospects for the future
-
Institute of Mathematical Statistic
-
Duncan, G.T., Pearson, R.W.: Enhancing access to microdata while protecting confidentiality: Prospects for the future. Stat. Sci. 6(3), 219-232 (1991). Institute of Mathematical Statistic
-
(1991)
Stat. Sci
, vol.6
, Issue.3
, pp. 219-232
-
-
Duncan, G.T.1
Pearson, R.W.2
-
2
-
-
85019687869
-
Privacy Enhancing Technologies: The path to anonymity
-
Hes, R., Borking, J.: Privacy Enhancing Technologies: the path to anonymity. ISBN. vol. 90(74087), p. 12 (1998)
-
(1998)
ISBN
, vol.90
, Issue.74087
-
-
Hes, R.1
Borking, J.2
-
3
-
-
50949085110
-
Addressing privacy requirements in system design: The PriS method
-
Springer
-
Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requirements Eng. 13(3), 241-255 (2008). Springer
-
(2008)
Requirements Eng
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
4
-
-
67449101466
-
Privacy patterns for online interactions
-
ACM
-
Romanosky, S., Acquisti, A., Hong, J., Cranor, L.F., Friedman, B.: Privacy patterns for online interactions. In: Proceedings of the 2006 Conference on Pattern Languages of Programs, p. 12. ACM (2006)
-
(2006)
Proceedings of the 2006 Conference on Pattern Languages of Programs
-
-
Romanosky, S.1
Acquisti, A.2
Hong, J.3
Cranor, L.F.4
Friedman, B.5
-
5
-
-
10044278069
-
Development and evaluation of emerging design patterns for ubiquitous computing
-
ACM
-
Chung, E.S., Hong, J.I., Lin, J., Prabaker, M.K., Landay, J.A., Liu, A.L.: Development and evaluation of emerging design patterns for ubiquitous computing. In: Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, pp. 233-242. ACM (2004)
-
(2004)
Proceedings of the 5Th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques
, pp. 233-242
-
-
Chung, E.S.1
Hong, J.I.2
Lin, J.3
Prabaker, M.K.4
Landay, J.A.5
Liu, A.L.6
-
6
-
-
84878677619
-
A pattern language for developing privacy enhancing technologies
-
Wiley Online Library
-
Hafiz, M.: A pattern language for developing privacy enhancing technologies. Softw. Pract. Experience 43(7), 769-787 (2013). Wiley Online Library
-
(2013)
Softw. Pract. Experience
, vol.43
, Issue.7
, pp. 769-787
-
-
Hafiz, M.1
-
8
-
-
79952752224
-
Security Patterns and Security Standards
-
Schumacher, M.: Security Patterns and Security Standards. In: EuroPLoP, pp. 289-300 (2002)
-
(2002)
Europlop
, pp. 289-300
-
-
Schumacher, M.1
-
10
-
-
33646184981
-
Security patterns meet agent oriented software engineering: A complementary solution for developing secure information systems
-
Delcambre, L., Kop, C., Mayr, H.C., Mylopoulos, J., Pastor, O. (eds.), LNCS, Springer, Heidelberg
-
Mouratidis, H., Weiss, M., Giorgini, P.: Security patterns meet agent oriented software engineering: a complementary solution for developing secure information systems. In: Delcambre, L., Kop, C., Mayr, H.C., Mylopoulos, J., Pastor, O. (eds.) ER 2005. LNCS, vol. 3716, pp. 225-240. Springer, Heidelberg (2005). doi:10.1007/ 11568322_15
-
(2005)
ER 2005
, vol.3716
, pp. 225-240
-
-
Mouratidis, H.1
Weiss, M.2
Giorgini, P.3
-
13
-
-
78649989557
-
-
Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (2010)
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
-
Pfitzmann, A.1
Hansen, M.2
-
15
-
-
84948946447
-
How to make personalized web browsing simple, secure, and anonymous
-
Hirschfeld, R. (ed.), LNCS, Springer, Heidelberg
-
Gabber, E., Gibbons, P.B., Matias, Y., Mayer, A.: How to make personalized web browsing simple, secure, and anonymous. In: Hirschfeld, R. (ed.) FC 1997. LNCS, vol. 1318, pp. 17-31. Springer, Heidelberg (1997). doi:10.1007/3-540-63594-7_64
-
(1997)
FC 1997
, vol.1318
, pp. 17-31
-
-
Gabber, E.1
Gibbons, P.B.2
Matias, Y.3
Mayer, A.4
-
17
-
-
0005063385
-
Onion routing
-
ACM, Chicago
-
Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42(2), 39-41 (1999). ACM, Chicago
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
18
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Springer
-
Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptology 1(1), 65-75 (1988). Springer
-
(1988)
J. Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
19
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
ACM
-
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-90 (1981). ACM
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
21
-
-
35248893039
-
GAP-practical anonymous networking
-
Dingledine, R. (ed.), LNCS, Springer, Heidelberg
-
Bennett, K., Grothoff, C.: GAP-practical anonymous networking. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 141-160. Springer, Heidelberg (2003). doi:10.1007/978-3-540-40956-4_10
-
(2003)
PET 2003
, vol.2760
, pp. 141-160
-
-
Bennett, K.1
Grothoff, C.2
-
23
-
-
85019706113
-
-
11/551,066
-
Akers, T., Ware, B., Zheng, W., Kostet, M., Clark, B.: Service Aggregation Gateway. U.S. Patent Application No. 11/551,066 (2006)
-
(2006)
Service Aggregation Gateway
-
-
Akers, T.1
Ware, B.2
Zheng, W.3
Kostet, M.4
Clark, B.5
-
24
-
-
50649106124
-
-
Springer Science & Business Media, New York
-
Jain, A., Flynn, P., Ross, A.A. (eds.): Handbook of Biometrics. Springer Science & Business Media, New York (2007)
-
(2007)
Handbook of Biometrics
-
-
Jain, A.1
Flynn, P.2
Ross, A.A.3
-
25
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.), LNCS, Springer, Heidelberg
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004). doi:10.1007/978-3-540-39881-3_18
-
(2004)
Security in Pervasive Computing
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
26
-
-
84958804013
-
Personalization on the Net using Web mining: Introduction
-
ACM
-
Mulvenna, M.D., Anand, S.S., Büchner, A.G.: Personalization on the Net using Web mining: introduction. Commun. ACM 43(8), 122-125 (2000). ACM
-
(2000)
Commun. ACM
, vol.43
, Issue.8
, pp. 122-125
-
-
Mulvenna, M.D.1
Anand, S.S.2
Büchner, A.G.3
-
32
-
-
84976606583
-
Apparatus: Reasoning about security requirements in the internet of things
-
Krogstie, J., Mouratidis, H., Su, J. (eds.), LNBIP, Springer, Cham
-
Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E., Kalloniatis, C.: Apparatus: reasoning about security requirements in the internet of things. In: Krogstie, J., Mouratidis, H., Su, J. (eds.) CAiSE 2016. LNBIP, vol. 249, pp. 219-230. Springer, Cham (2016). doi:10.1007/978-3-319-39564-7_21
-
(2016)
Caise 2016
, vol.249
, pp. 219-230
-
-
Mavropoulos, O.1
Mouratidis, H.2
Fish, A.3
Panaousis, E.4
Kalloniatis, C.5
-
33
-
-
85019721542
-
Methodologies and Tools for Building Intelligent Collaboration and Transaction Environments in Public Administration Networks
-
University of the Aegean
-
ICTE-PAN: Methodologies and Tools for Building Intelligent Collaboration and Transaction Environments in Public Administration Networks. In: Project Deliverable D 3.1b. University of the Aegean (2005)
-
(2005)
Project Deliverable D 3.1B
-
-
|