Privacy Management in Global Organisations
暂无分享,去创建一个
[1] David J. Danelski,et al. Privacy and Freedom , 1968 .
[2] William J. Kirsch,et al. The protection of privacy and transborder flows of personal data: the work of the Council of Europe, the Organization for Economic Co-operation and Development and the European Economic Community , 1982, Legal Issues of Economic Integration.
[3] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[4] J. Rubenfeld. The Right of Privacy , 1989 .
[5] Shafi Goldwasser,et al. Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.
[6] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[7] Michael K. Reiter,et al. Anonymous Web transactions with Crowds , 1999, CACM.
[8] Andrew S. Patrick,et al. From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions , 2003, Privacy Enhancing Technologies.
[9] Tomaz Klobucar,et al. Privacy-Enhancing Technologies - approaches and development , 2003, Comput. Stand. Interfaces.
[10] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[11] J. C. Cannon. Privacy: What Developers and IT Professionals Should Know , 2004 .
[12] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[13] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[14] Siani Pearson,et al. Securing Information Transfer in Distributed Computing Environments , 2008, IEEE Security & Privacy.
[15] James A. Hendler,et al. Information accountability , 2008, CACM.
[16] Gene novark,et al. Exterminator: Automatically correcting memory errors with high probability , 2008, CACM.
[17] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[18] Thomas S. Heydt-Benjamin,et al. Accountable privacy supporting services , 2009 .
[19] Andrew Charlesworth,et al. Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.
[20] Sadie Creese,et al. Data Protection-Aware Design for Cloud Services , 2009, CloudCom.
[21] Siani Pearson,et al. Scalable, accountable privacy management for large organizations , 2009, 2009 13th Enterprise Distributed Object Computing Conference Workshops.
[22] Rajneesh Sharma,et al. Privacy Management for Global Organizations , 2009, DPM/SETOP.
[23] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[24] Andrew Charlesworth,et al. Analysis of Privacy Impact Assessments within Major jurisdictions , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[25] Siani Pearson,et al. Decision Support for Selection of Cloud Service Providers , 2010 .
[26] Siani Pearson,et al. Enhancing privacy in cloud computing via policy-based obfuscation , 2012, The Journal of Supercomputing.
[27] S. Qureshi,et al. E-Business Applications for Product Development and Competitive Growth: Emerging Technologies , 2010 .
[28] Joaquin Garcia-Alfaro,et al. Data Privacy Management and Autonomous Spontaneous Security, 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers , 2010, DPM/SETOP.
[29] Peter Schaar,et al. Privacy by Design , 2010 .
[30] Andrew Charlesworth,et al. A Privacy Impact Assessment Tool for Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[31] Siani Pearson. Addressing Complexity in a Privacy Expert System , 2010, IPMU.
[32] A. Cavoukian,et al. Privacy by Design: essential for organizational accountability and strong business practices , 2010 .
[33] Bu-Sung Lee,et al. Towards Achieving Accountability, Auditability and Trust in Cloud Computing , 2011, ACC.
[34] Valérie Issarny,et al. Security and Trust , 2011, SFM.
[35] Siani Pearson,et al. Sticky Policies: An Approach for Managing Privacy across Multiple Parties , 2011, Computer.
[36] S. Gritzalis,et al. Privacy Enhancing Technologies: A Review , 2003, EGOV.
[37] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[38] Siani Pearson,et al. Privacy Compliance Checking using a Model-Based Approach , 2011 .
[39] Kai Rannenberg,et al. Privacy and Identity Management for Life , 2011, Privacy and Identity Management for Life.
[40] Siani Pearson,et al. A Decision Support System for Privacy Compliance , 2012 .
[41] Siani Pearson,et al. Privacy and Security for Cloud Computing , 2012, Computer Communications and Networks.
[42] Jan Camenisch,et al. Information privacy?! , 2012, Comput. Networks.
[43] Raj Sharman,et al. Threats, Countermeasures and Advances in Applied Information Security , 2012 .
[44] A. Cavoukian. Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era , 2012 .
[45] Radu State,et al. Data Privacy Management and Autonomous Spontaneous Security , 2013, Lecture Notes in Computer Science.
[46] Marc Langheinrich,et al. Privacy By Design , 2013, IEEE Pervasive Comput..
[47] Siani Pearson,et al. Privacy, Security and Trust in Cloud Computing , 2013 .