Scenario, Analysis, and Design of Privacy Throughout Life Demonstrator
暂无分享,去创建一个
[1] Viktor Mayer-Schoenberger,et al. Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing , 2007 .
[2] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[3] C. Kuner. European Data Protection Law: Corporate Compliance and Regulation , 2007 .
[4] Marit Hansen,et al. Identity management throughout one's whole life , 2008, Inf. Secur. Tech. Rep..
[5] David J. Phillips. Privacy policy and PETs , 2001, New Media Soc..
[6] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] Bart Preneel,et al. Cross-Context Delegation through Identity Federation , 2008, BIOSIG.
[9] Marit Hansen,et al. PRIME white paper v3, May 2008 , 2008 .
[10] Ann Cavoukian,et al. Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.
[11] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[12] Adi Shamir,et al. How to share a secret , 1979, CACM.
[13] David A. Wagner,et al. Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.
[14] Bruno Crispo,et al. Delegation of Responsibilities , 1998 .
[15] Dean Povey. Optimistic security: a new access control paradigm , 1999, NSPW '99.
[16] Sebastian Clauß,et al. Identity management and its support of multilateral security , 2001, Comput. Networks.
[17] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.
[18] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[19] Andreas Pfitzmann,et al. Lifelong Privacy: Privacy and Identity Management for Life , 2009, PrimeLife.
[20] Paul Baran,et al. Communications, computers and people , 1965, AFIPS '65 (Fall, part II).
[21] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[22] Jan Zibuschka,et al. Requirements for privacy enhancing tools , 2008 .
[23] Hans Hedbom,et al. Analysis of Privacy and Identity Management throughout Life , 2009 .
[24] Teresa Scassa,et al. National Identity, Ethnic Surnames and the State , 1996, Canadian journal of law and society.
[25] Ronald E. Leenes,et al. Audience Segregation in Social Network Sites , 2010, 2010 IEEE Second International Conference on Social Computing.
[26] Egbert Dommering. Regulating Technology: Code is Not Law , 2006 .
[27] Katrin Borcea-Pfitzmann,et al. Implementability of the Identity Management Part in Pfitzmann/Hansen's Terminology for a Complex Digital World , 2010, PrimeLife.
[28] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .
[29] R. Accorsi,et al. On Privacy Evidence for UbiComp Environments , 2007 .
[30] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[31] Abhi Shelat,et al. Privacy and identity management for everyone , 2005, DIM '05.
[32] J. Rachels. Why privacy is important , 1985 .
[33] Gregory Neven. Final requirements and state-of-the-art for next generation policies , 2009 .
[34] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[35] Johannes A. Buchmann,et al. Perspectives for cryptographic long-term security , 2006, CACM.
[36] Sandra Steinbrecher,et al. PrimeLife Heartbeat H 1.3.4 Definition of: Prototype ideas for selected scenarios , 2009 .
[37] Martin Meints. The Relationship between Data Protection Legislation and Information Security Related Standards , 2008, FIDIS.
[38] Dowe Korff. Are users of social networking sites subject to data protection law, as controllers? , 2009 .
[39] Ed Dawson,et al. On a Taxonomy of Delegation , 2009, SEC.
[40] Sandra Steinbrecher,et al. PrimeLife Heartbeat H1.3.5: Requirements and concepts for identity management throughout life , 2009 .
[41] Mihir Bellare,et al. Forward Integrity For Secure Audit Logs , 1997 .
[42] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[43] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[44] Marit Hansen,et al. Delegation for Privacy Management from Womb to Tomb - A European Perspective , 2009, PrimeLife.
[45] James Q. Whitman. The Two Western Cultures of Privacy: Dignity versus Liberty , 2004 .