Privacy-Preserving Mechanism for Monitoring Sensitive Data
暂无分享,去创建一个
[1] Lisa Singh,et al. Exploring re-identification risks in public domains , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.
[2] Jie Xu,et al. A survey of personal privacy protection in public service mashups , 2011, Proceedings of 2011 IEEE 6th International Symposium on Service Oriented System (SOSE).
[3] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[4] Ralph Stair,et al. Principles of information systems , 2014 .
[5] Malek Ben Salem,et al. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[6] Dan Lin,et al. Promoting Distributed Accountability in the Cloud , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[7] Richard Walters. The cloud challenge: realising the benefits without increasing risk , 2012 .
[8] Mats Näslund,et al. Privacy in machine-to-machine communications A state-of-the-art survey , 2012, 2012 IEEE International Conference on Communication Systems (ICCS).
[9] Alessandro Acquisti,et al. Misplaced Confidences , 2013, WEIS.
[10] S. Fischer-h bner. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .
[11] A. Westin. Social and Political Dimensions of Privacy , 2003 .
[12] Ian Molyneaux. The Art of Application Performance Testing - Help for Programmers and Quality Assurance , 2009 .
[13] Jonathan M. Spring,et al. Monitoring Cloud Computing by Layer, Part 2 , 2011, IEEE Security & Privacy.
[14] Flora Amato,et al. A semantic based methodology to classify and protect sensitive data in medical records , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[15] Roel Peeters,et al. Distributed privacy-preserving transparency logging , 2013, WPES.
[16] Bhavani M. Thuraisingham,et al. Identity management for cloud computing: developments and directions , 2011, CSIIRW '11.
[17] Norjihan Abdul Ghani,et al. Controlling your personal information disclosure , 2008 .
[18] H. Tavani,et al. Cyberstalking, personal privacy, and moral responsibility , 2002, Ethics and Information Technology.