On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking
暂无分享,去创建一个
Noboru Sonehara | Isao Echizen | Günter Müller | Sven Wohlgemuth | G. Müller | I. Echizen | N. Sonehara | Sven Wohlgemuth
[1] Alexander Pretschner,et al. Distributed usage control , 2006, CACM.
[2] Rafael Accorsi. Automated Privacy Audits to Complement the Notion of Control for Identity Management , 2007, IDMAN.
[3] Alexander Pretschner,et al. On Obligations , 2005, ESORICS.
[4] Siani Pearson,et al. An Adaptive Privacy Management System for Data Repositories , 2005, TrustBus.
[5] Birgit Pfitzmann,et al. Asymmetric Fingerprinting (Extended Abstract) , 1996, EUROCRYPT.
[6] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[7] Michael Waidner,et al. Privacy-enabled services for enterprises , 2002, Proceedings. 13th International Workshop on Database and Expert Systems Applications.
[8] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[9] Heiko Mantel,et al. Information Flow Control and Applications - Bridging a Gap , 2001, FME.
[10] Günter Müller,et al. Privacy with Delegation of Rights by Identity Management , 2006, ETRICS.
[11] Christian Schaefer,et al. Usage Control Enforcement: Present and Future , 2008, IEEE Security & Privacy.
[12] Kian-Lee Tan,et al. WmXML: A System for Watermarking XML Data , 2005, VLDB.