Scalable Computing: Practice and Experience
暂无分享,去创建一个
[1] R. Costa,et al. Enhancing conflict resolution through an AHP-based methodology , 2014 .
[2] George Yee. The Negotiation of Privacy Policies in Distance Education 1 , 2003 .
[3] Laurent Bussard,et al. S4P: A Generic Language for Specifying Privacy Preferences and Policies , 2010 .
[4] Giampaolo Bella,et al. Enforcing privacy in e-commerce by balancing anonymity and trust , 2011, Comput. Secur..
[5] Karen Renaud,et al. Privacy: Aspects, definitions and a multi-faceted privacy preservation approach , 2010, 2010 Information Security for South Africa.
[6] Gail-Joon Ahn,et al. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks , 2011, ACSAC '11.
[7] Ali Görener,et al. Comparing AHP and ANP: An Application of Strategic Decisions Making in a Manufacturing Company , 2012 .
[8] Thomas L. Saaty,et al. Decision-making with the AHP: Why is the principal eigenvector necessary , 2003, Eur. J. Oper. Res..
[9] Liu Hongxia,et al. A privacy-preserving access control in outsourced storage services , 2011, 2011 IEEE International Conference on Computer Science and Automation Engineering.
[10] Lei Chen,et al. A framework for privacy-preserving healthcare data sharing , 2012, 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom).
[11] Amjad Gawanmeh,et al. Challenges in Formal Methods for Testing and Verification of Cloud Computing Systems , 2015, Scalable Comput. Pract. Exp..
[12] Hanan El Bakkali,et al. PPAMH: A novel privacy-preserving approach for mobile healthcare , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).
[13] Amjad Gawanmeh. An axiomatic model for formal specification requirements of ubiquitous healthcare systems , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).
[14] D. Parker. Verification of Probabilistic Real-time Systems , 2013 .
[15] Yang Xin,et al. Full privacy preserving electronic voting scheme , 2012 .
[16] Michael Rovatsos,et al. Privacy Policy Negotiation in Social Media , 2014, TAAS.
[17] Socrates H. Tuch. Health Insurance Portability and Accountability Act of 1996. Public Law 104-191. , 1996, United States statutes at large.
[18] Renato Iannella,et al. Privacy oriented access control for electronic health records , 2012, WWW 2012.
[19] David W. Chadwick,et al. A privacy preserving authorisation system for the cloud , 2012, J. Comput. Syst. Sci..
[20] Julita Vassileva,et al. P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage , 2014, 2014 IEEE Security and Privacy Workshops.
[21] M SuchJose,et al. Privacy Policy Negotiation in Social Media , 2016 .
[22] Mahmoud Al-Qutayri,et al. Reliability analysis of healthcare information systems: State of the art and future directions , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).
[23] Marta Z. Kwiatkowska,et al. PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.
[24] Joel J. P. C. Rodrigues,et al. Mobile-health: A review of current state in 2015 , 2015, J. Biomed. Informatics.
[25] Osman Hasan,et al. Formal reliability analysis of Device Interoperability Middleware (DIM) based E-health system using PRISM , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).
[26] Amit Sahu. A Review on Enhancing Privacy Preservation of Web Service through Negotiation Mechanism , 2015 .
[27] Eugeniusz J. Sobczyk,et al. The problem of developing prospective hard coal deposits from the point of view of social and environmental conflicts with the use of AHP method , 2013 .
[28] Vallipuram Muthukkumarasamy,et al. Enhancing Trust on e-Government: A Decision Fusion Module , 2009, 2009 Third International Conference on Network and System Security.
[29] Sofiène Tahar,et al. Formal reliability analysis of a typical FHIR standard based e-Health system using PRISM , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).
[30] Dickson K. W. Chiu,et al. Enabling Web Services Policy Negotiation with Privacy preserved using XACML , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[31] Thomas L. Saaty,et al. DECISION MAKING WITH THE ANALYTIC HIERARCHY PROCESS , 2008 .
[32] Ilaria Matteucci,et al. A prototype for solving conflicts in XACML-based e-Health policies , 2013, Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems.
[33] BellaGiampaolo,et al. Enforcing privacy in e-commerce by balancing anonymity and trust , 2011 .