Privacy throughout the data cycle

• A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers.

[1]  Matthew K. O. Lee,et al.  An integrative model of consumer trust in internet shopping , 2003, ECIS.

[2]  Adeline Nazarenko,et al.  Ontologies and Information Extraction , 2006, ArXiv.

[3]  L. Mui,et al.  A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[4]  Diego Gambetta,et al.  Measuring people's trust , 2009 .

[5]  E. Michael Maximilien,et al.  Toward autonomic web services trust and selection , 2004, ICSOC '04.

[6]  Rajeev Agrawal,et al.  Ranking Privacy Policy , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.

[7]  Tingting Han,et al.  Diagnosis, Synthesis and Analysis of Probabilistic Models , 2009, Ausgezeichnete Informatikdissertationen.

[8]  Carst Tankink Documentation and formal mathematics : web technology meets theorem proving , 2013 .

[9]  Stephen Marsh,et al.  Examining Trust, Forgiveness and Regret as Computational Concepts , 2009, Computing with Social Trust.

[10]  Esma Aïmeur,et al.  UPP: User Privacy Policy for Social Networking Sites , 2009, 2009 Fourth International Conference on Internet and Web Applications and Services.

[11]  Stephanie Kemper,et al.  Modelling and analysis of real-time coordination patterns , 2011 .

[12]  Adriaan Middelkoop,et al.  Inference of Program Properties with Attribute Grammars, Revisited , 2012 .

[13]  Gerardo Canfora,et al.  An empirical comparison of methods to support QoS-aware service selection , 2010, PESOS '10.

[14]  L. Festinger,et al.  A Theory of Cognitive Dissonance , 2017 .

[15]  van der,et al.  Domain specific languages and their type systems , 2014 .

[16]  M. J. de Mol,et al.  Reasoning about functional programs : Sparkle, a proof assistant for Clean , 2009 .

[17]  Fabrizio Sebastiani,et al.  Machine learning in automated text categorization , 2001, CSUR.

[18]  Hung Q. Ngo,et al.  A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.

[19]  Chi-Chun Lo,et al.  A Reputation-Based Service Selection Scheme , 2009, 2009 IEEE International Conference on e-Business Engineering.

[20]  Steven M. Bellovin,et al.  Privee: An Architecture for Automatically Analyzing Web Privacy Policies , 2014, USENIX Security Symposium.

[21]  Jerry den Hartog,et al.  Trust and punishment , 2007, Autonomics.

[22]  Jean-Marc Robert,et al.  Trust in new decision aid systems , 2006, IHM '06.

[23]  B. Lijnse,et al.  TOP to the rescue. Task-oriented programming for incident response applications , 2005 .

[24]  Feng Li,et al.  A Holistic Framework for Trust in Online Transactions , 2012 .

[25]  Guido Smits,et al.  Improved SVM regression using mixtures of kernels , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[26]  Tong Zhang,et al.  Text Mining: Predictive Methods for Analyzing Unstructured Information , 2004 .

[27]  Alicia Ageno,et al.  Adaptive information extraction , 2006, CSUR.

[28]  Sebastiaan Gijsbert Marinus Cornelissen,et al.  Evaluating Dynamic Analysis Techniques for Program Comprehension , 2009 .

[29]  L. Lensink,et al.  Applying formal methods in software development , 2013 .

[30]  Tom Staijen,et al.  Graph-based Specification and Verification for Aspect-Oriented Languages , 2010 .

[31]  Diego Gambetta Trust : making and breaking cooperative relations , 1992 .

[32]  de A. Bruin,et al.  Service-oriented discovery of knowledge : foundations, implementations and applications , 2010 .

[33]  Thorsten Joachims,et al.  Text Categorization with Support Vector Machines: Learning with Many Relevant Features , 1998, ECML.

[34]  L. Jean Camp,et al.  Designing for Trust , 2002, Trust, Reputation, and Security.

[35]  Mjm Marcel Roeloffzen Kinetic data structures in the black-box model , 2013 .

[36]  Adrianus Johannus Paulus Jeckmans Cryptographically-Enhanced Privacy for Recommender Systems , 2014 .

[37]  David H. Wolpert,et al.  Stacked generalization , 1992, Neural Networks.

[38]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[39]  Nicola Zannone,et al.  Towards the development of privacy-aware systems , 2009, Inf. Softw. Technol..

[40]  Georgios Paliouras,et al.  Combining Information Extraction Systems Using Voting and Stacked Generalization , 2005, J. Mach. Learn. Res..

[41]  Hamish Cunningham,et al.  GATE-a General Architecture for Text Engineering , 1996, COLING.

[42]  Bas Basten,et al.  Ambiguity Detection for Programming Language Grammars , 2011 .

[43]  Meagen M Rosenthal Curriculum vitae for , 2015 .

[44]  Young-Joo Moon,et al.  Stochastic models for quality of service of component connectors , 2011 .

[45]  Ismail Hakki Toroslu,et al.  A Semantic-Based User Privacy Protection Framework for Web Services , 2003, ITWP.

[46]  A. Rodriguez Yakushev,et al.  Towards Getting Generic Programming Ready for Prime Time , 2009 .

[47]  R. Polikar,et al.  Ensemble based systems in decision making , 2006, IEEE Circuits and Systems Magazine.

[48]  Hyunbo Cho,et al.  On the functional quality of service (FQoS) to discover and compose interoperable web services , 2009, Expert Syst. Appl..

[49]  Batya Friedman,et al.  Trust online , 2000, CACM.

[50]  R.S.S. O'Connor,et al.  Incompleteness & completeness : formalizing logic and analysis in type theory , 2005 .

[51]  Nicola Zannone,et al.  Data Leakage Quantification , 2014, DBSec.

[52]  Dimitris Kanellopoulos,et al.  Data Preprocessing for Supervised Leaning , 2007 .

[53]  Alfons Laarman,et al.  Scalable multi-core model checking , 2014 .

[54]  Hugo Jonker,et al.  Security matters : privacy in voting and fairness in digital exchange , 2009 .

[55]  Mary Beth Rosson,et al.  End user concern about security and privacy threats , 2007, SOUPS '07.

[56]  Pavel Berkhin,et al.  A Survey of Clustering Data Mining Techniques , 2006, Grouping Multidimensional Data.

[57]  Lior Rokach,et al.  A Survey of Data Leakage Detection and Prevention Solutions , 2012, SpringerBriefs in Computer Science.

[58]  Geoff Holmes,et al.  Multinomial Naive Bayes for Text Categorization Revisited , 2004, Australian Conference on Artificial Intelligence.

[59]  Leonor Barroca,et al.  Requirements-Driven Collaborative Choreography Customization , 2009, ICSOC/ServiceWave.

[60]  Lorrie Faith Cranor,et al.  Use of a P3P user agent by early adopters , 2002, WPES '02.

[61]  Yinsheng Li,et al.  A Fuzzy Model for Selection of QoS-Aware Web Services , 2006, 2006 IEEE International Conference on e-Business Engineering (ICEBE'06).

[62]  Brent A. Scott,et al.  Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. , 2007, The Journal of applied psychology.

[63]  Xin Jin,et al.  Architecture for Data Collection in Database Intrusion Detection Systems , 2007, Secure Data Management.

[64]  Alessandro Acquisti,et al.  The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.

[65]  Nikolay Mehandjiev,et al.  Multi-criteria service recommendation based on user criteria preferences , 2011, RecSys '11.

[66]  J. van den Berg,et al.  Reasoning about Java programs in PVS using JML , 2009 .

[67]  J. Rotter Interpersonal trust, trustworthiness, and gullibility. , 1980 .

[68]  Boualem Benatallah,et al.  A Petri Net-based Model for Web Service Composition , 2003, ADC.

[69]  Marcel Verhoef,et al.  Modeling and validating distributed embedded real-time control systems , 2009 .

[70]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[71]  John Mylopoulos,et al.  Hierarchical hippocratic databases with minimal disclosure for virtual organizations , 2006, The VLDB Journal.

[72]  Chao Lan,et al.  Anomaly Detection , 2018, Encyclopedia of GIS.

[73]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[74]  Cor-Paul Bezemer,et al.  Performance Optimization of Multi-Tenant Software Systems , 2014 .

[75]  Diego Gambetta Can We Trust Trust , 2000 .

[76]  Taiwo Oladipupo Ayodele,et al.  Types of Machine Learning Algorithms , 2010 .

[77]  John Businge,et al.  Co-evolution of the Eclipse SDK Framework and Its Third-Party Plug-Ins , 2013, 2013 17th European Conference on Software Maintenance and Reengineering.

[78]  Ronald Middelkoop,et al.  Capturing and exploiting abstract views of states in OO verification , 2011 .

[79]  Kun Chang Lee,et al.  Transfer From Offline Trust to Key Online Perceptions: An Empirical Study , 2007, IEEE Transactions on Engineering Management.

[80]  Lior Rokach,et al.  Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure , 2011, CCS '11.

[81]  Barton A. Weitz,et al.  Self-Disclosure on the Web: the Impact of Privacy Policy, Reward, and Company Reputation , 2002 .

[82]  Lionel Mamane,et al.  Interactive mathematical documents: creation and presentation , 2004 .

[83]  D. Halpern Thought and Knowledge: An Introduction to Critical Thinking , 1995 .

[84]  Karina R. Olmos Joffré Strategies for Context Sensitive Program Transformation , 2009 .

[85]  David A. Landgrebe,et al.  A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..

[86]  Hamish Cunningham,et al.  Information Extraction, Automatic , 2006 .

[87]  Xiang Fu,et al.  Formal Verification of e-Services and Workflows , 2002, WES.

[88]  Yifan He,et al.  A Comparison among Three Neural Networks for Text Classification , 2006, 2006 8th international Conference on Signal Processing.

[89]  Tim K. Cocx,et al.  Algorithmic tools for data-oriented law enforcement , 2009 .

[90]  Ken Barker,et al.  Quantifying Privacy Violations , 2011, Secure Data Management.

[91]  Frank S. de Boer,et al.  Combining Monitoring with Run-Time Assertion Checking , 2014, SFM.

[92]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[93]  Joobin Choobineh,et al.  Trust in electronic commerce: definition and theoretical considerations , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[94]  I. V. Ramakrishnan,et al.  A Framework for Building Privacy-Conscious Composite Web Services , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).

[95]  van Mf Marcel Amstel,et al.  Assessing and improving the quality of model transformations , 2012 .

[96]  Frederick Reiss,et al.  SystemT: a system for declarative information extraction , 2009, SGMD.

[97]  Clare-Marie Karat,et al.  Usable security and privacy: a case study of developing privacy management tools , 2005, SOUPS '05.

[98]  Axel Belinfante,et al.  JTorX: exploring model-based testing , 2014 .

[99]  Hendrik Michaël van der Bijl,et al.  On changing models in model-based testing , 2011 .

[100]  Jerry den Hartog,et al.  On-line trust perception: What really matters , 2011, 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST).

[101]  J HoffmanLance,et al.  Trust beyond security , 2006 .

[102]  Chao-Jung Hsu,et al.  Dominant Factors for Online Trust , 2008, 2008 International Conference on Cyberworlds.

[103]  M. S. Greiler,et al.  Test Suite Comprehension for Modular and Dynamic Systems , 2013 .

[104]  Karin Bernsmed,et al.  A Server-side Approach to Privacy Policy Matching , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[105]  Lars Kotthoff,et al.  A Preliminary Evaluation of Machine Learning in Algorithm Selection for Search Problems , 2011, SOCS.

[106]  Mari Antonius Cornelis Dekker,et al.  Flexible Access Control for Dynamic Collaborative Environments , 2009 .

[107]  Jerry den Hartog,et al.  Understanding Perceived Trust to Reduce Regret , 2015, Comput. Intell..

[108]  Patrick Martin,et al.  Reputation-Enhanced QoS-based Web Services Discovery , 2007, IEEE International Conference on Web Services (ICWS 2007).

[109]  Neda Yousefi,et al.  A proposed model of e-trust for electronic banking , 2015 .

[110]  Norman L. Chervany,et al.  What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..

[111]  Marcus A. Maloof,et al.  Detecting Insider Theft of Trade Secrets , 2009, IEEE Security & Privacy.

[112]  Barry Smyth,et al.  Trust in recommender systems , 2005, IUI.

[113]  Paul W. Thurston,et al.  A Monte Carlo Study of Missing Item Methods , 2000 .

[114]  Sebastián Uchitel,et al.  WS-Engineer: A Model-Based Approach to Engineering Web Service Compositions and Choreography , 2007, Test and Analysis of Web Services.

[115]  Sharon Paradesi,et al.  Integrating Behavioral Trust in Web Service Compositions , 2009, 2009 IEEE International Conference on Web Services.

[116]  Thomas Bäck,et al.  Mixed-integer evolution strategies for parameter optimization and their applications to medical image analysis , 2005 .

[117]  A. Morali,et al.  IT architecture-based confidentiality risk assessment in networks of organizations , 2011 .

[118]  M. Lynn Determination and quantification of content validity. , 1986, Nursing research.

[119]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[120]  Sharad Mehrotra,et al.  XAR: An Integrated Framework for Information Extraction , 2009, 2009 WRI World Congress on Computer Science and Information Engineering.

[121]  Somayeh Malakuti Khah Olun Abadi Event composition model: achieving naturalness in runtime enforcement , 2011 .

[122]  Farhad Arbab,et al.  Model Checking of Component Connectors , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[123]  Sandro Etalle,et al.  N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols , 2012, RAID.

[124]  Chi-Chun Lo,et al.  Fuzzy matchmaking for Web services , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[125]  Charles J. Kacmar,et al.  Shifting Factors and the Ineffectiveness of Third Party Assurance Seals: A Two-Stage Model of Initial Trust in a Web Business , 2004, Electron. Mark..

[126]  Lynette Hirschman,et al.  Automating Coreference: The Role of Annotated Training Data , 1998, ArXiv.

[127]  Ramakrishnan Srikant,et al.  XPref: a preference language for P3P , 2005, Comput. Networks.

[128]  Gerhard de Koning Gans,et al.  Outsmarting smart cards , 2013 .

[129]  Ali Mesbah,et al.  Analysis and Testing of Ajax-based Single-page Web Applications , 2009 .

[130]  Marit Hansen,et al.  Towards Displaying Privacy Information with Icons , 2010, PrimeLife.

[131]  Vuong Xuan Tran,et al.  QoS Based Ranking for Web Services: Fuzzy Approaches , 2008, 2008 4th International Conference on Next Generation Web Services Practices.

[132]  Arthur E. Hoerl,et al.  Ridge Regression: Biased Estimation for Nonorthogonal Problems , 2000, Technometrics.

[133]  Tim Moses,et al.  EXtensible Access Control Markup Language (XACML) version 1 , 2003 .

[134]  Aah Ammar Osaiweran Formal development of control software in the medical systems domain , 2012 .

[135]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[136]  Vipin Kumar,et al.  Similarity Measures for Categorical Data: A Comparative Evaluation , 2008, SDM.

[137]  Annie I. Antón,et al.  'I Need It Now': Improving Website Usability by Contextualizing Privacy Policies , 2004, ICWE.

[138]  Sotiris B. Kotsiantis,et al.  Supervised Machine Learning: A Review of Classification Techniques , 2007, Informatica.

[139]  Scw Bas Ploeger,et al.  Improved verification methods for concurrent systems , 2009 .

[140]  Joobin Choobineh,et al.  An Empirical Evaluation of the Factors Affecting Trust in Web Bankng Systems , 2000 .

[141]  Pieter H. Hartel,et al.  Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems , 2009, RAID.

[142]  Hasan Sözer,et al.  Architecting Fault-Tolerant Software Systems , 2009 .

[143]  Yiming Yang,et al.  Robustness of regularized linear classification methods in text categorization , 2003, SIGIR.

[144]  Colin Potts,et al.  Privacy policies as decision-making tools: an evaluation of online privacy notices , 2004, CHI.

[145]  Ann L. Fruhling,et al.  The influence of user interface usability on rural consumers' trust of e-health services , 2006, Int. J. Electron. Heal..

[146]  J. Rotter Generalized expectancies for interpersonal trust. , 1971 .

[147]  Thomas L. Saaty,et al.  How to Make a Decision: The Analytic Hierarchy Process , 1990 .

[148]  Alina A. von Davier,et al.  Cross-Validation , 2014 .

[149]  Lea Kutvonen,et al.  Trust Management Survey , 2005, iTrust.

[150]  Jorge Bernardino,et al.  Securing Data Warehouses from Web-Based Intrusions , 2012, WISE.

[151]  Lacramioara Astefanoaei,et al.  An executable theory of multi-agent systems refinement , 2011 .

[152]  van Mpwj Michiel Osch Automated model-based testing of hybrid systems , 2009 .

[153]  Z Zvezdan Protic,et al.  Configuration management for models : generic methods for model comparison and model co-evolution , 2011 .

[154]  Susan Wiedenbeck,et al.  On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..

[155]  Diana Maynard,et al.  JAPE: a Java Annotation Patterns Engine , 2000 .

[156]  Lori N. K. Leonard,et al.  Trust in consumer-to-consumer electronic commerce , 2008, Inf. Manag..

[157]  Ingoo Han,et al.  The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce , 2003, Int. J. Electron. Commer..

[158]  C. Johnson-George,et al.  Measurement of specific interpersonal trust: Construction and validation of a scale to assess trust in a specific other. , 1982 .

[159]  Chih-Jen Lin,et al.  A Practical Guide to Support Vector Classication , 2008 .

[160]  Gerard Salton,et al.  Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..

[161]  Annie I. Antón,et al.  Financial privacy policies and the need for standardization , 2004, IEEE Security & Privacy Magazine.

[162]  Wouter Meulemans,et al.  Similarity measures and algorithms for cartographic schematization , 2014 .

[163]  John D. Lee,et al.  Trust in Automation: Designing for Appropriate Reliance , 2004, Hum. Factors.

[164]  Michael Mrissa,et al.  Privacy-Aware DaaS Services Composition , 2011, DEXA.

[165]  Lior Rokach,et al.  M-Score: A Misuseability Weight Measure , 2012, IEEE Transactions on Dependable and Secure Computing.

[166]  Xin Jin,et al.  Database Intrusion Detection Using Role Profiling with Role Hierarchy , 2009, Secure Data Management.

[167]  C. J. Boogerd,et al.  Focusing Automatic Code Inspections , 2010 .

[168]  Scott Flinn,et al.  User Perceptions of Privacy and Security on the Web , 2005, PST.

[169]  Audun Jøsang,et al.  Privacy Policy Referencing , 2010, TrustBus.

[170]  Eduardo Zambon,et al.  Abstract Graph Transformation - Theory and Practice , 2013 .

[171]  Azadeh Iranmehr,et al.  Trust Management for Semantic Web , 2009, 2009 Second International Conference on Computer and Electrical Engineering.

[172]  Kees van Deemter,et al.  On Coreferring: Coreference in MUC and Related Annotation Schemes , 2000, CL.

[173]  J. Doug Tygar,et al.  Systematic analysis and evaluation of web privacy policies and implementations , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[174]  J. Kwisthout,et al.  The Computational Complexity of Probabilistic Networks , 2009 .

[175]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[176]  A. Everard,et al.  Effect of Presentation Flaws on Users' Perception of Quality of On-Line Stores' Web Sites: Is it Perception that Really Counts? , 2003 .

[177]  Omer Tene Jules Polonetsky,et al.  Privacy in the Age of Big Data: A Time for Big Decisions , 2012 .

[178]  Martin R. Neuhäußer,et al.  Model checking nondeterministic and randomly timed systems , 2010 .

[179]  Ardion Beldad,et al.  How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust , 2010, Comput. Hum. Behav..

[180]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[181]  Jerry den Hartog,et al.  Hunting the Unknown - White-Box Database Leakage Detection , 2014, DBSec.

[182]  David W. Chadwick,et al.  A controlled natural language interface for authoring access control policies , 2011, SAC.

[183]  Jerry den Hartog,et al.  Trust Management and User’s Trust Perception in e-Business , 2013 .

[184]  Silvana Faja,et al.  E-Health: An Exploratory Study of Trust Building Elements in Behavioral Health , 2006 .

[185]  Huan Liu,et al.  Chi2: feature selection and discretization of numeric attributes , 1995, Proceedings of 7th IEEE International Conference on Tools with Artificial Intelligence.

[186]  Wei-Yin Loh,et al.  Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..

[187]  Shankar Ganesan Determinants of Long-Term Orientation in Buyer-Seller Relationships , 1994 .

[188]  Lennart C. L. Kats,et al.  Building Blocks for Language Workbenches , 2011 .

[189]  Ehud Gudes,et al.  DIWeDa - Detecting Intrusions in Web Databases , 2008, DBSec.

[190]  John Mylopoulos,et al.  Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology , 2010, Advances in Intelligent Information Systems.

[191]  Andrew P. Bradley,et al.  The use of the area under the ROC curve in the evaluation of machine learning algorithms , 1997, Pattern Recognit..

[192]  D. Freedman,et al.  On the histogram as a density estimator:L2 theory , 1981 .

[193]  Bonnie M. Muir,et al.  Trust Between Humans and Machines, and the Design of Decision Aids , 1987, Int. J. Man Mach. Stud..

[194]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[195]  Weider D. Yu,et al.  A Privacy Assessment Approach for Serviced Oriented Architecture Application , 2006, 2006 Second IEEE International Symposium on Service-Oriented System Engineering (SOSE'06).

[196]  Ryan A. Rossi,et al.  Automatically identifying relations in privacy policies , 2009, SIGDOC '09.

[197]  Jja Jeroen Keiren,et al.  Advanced reduction techniques for model checking , 2013 .

[198]  Gavin Brown,et al.  Ensemble Learning , 2010, Encyclopedia of Machine Learning and Data Mining.

[199]  N. L. Chervany,et al.  Initial Trust Formation in New Organizational Relationships , 1998 .

[200]  M. Abdullah,et al.  Consumers' E-commerce acceptance model: Antecedents of trust and satisfaction constructs , 2012, 2012 IEEE Business, Engineering & Industrial Applications Colloquium (BEIAC).

[201]  Joost Winter,et al.  Coalgebraic Characterizations of Automata-Theoretic Classes , 2014 .

[202]  Milan Petkovic,et al.  What websites know about you : privacy policy analysis using information extraction , 2013 .

[203]  Sonia San Martín Gutiérrez,et al.  A Cross-National Study on Online Consumer Perceptions, Trust, and Loyalty , 2012, J. Organ. Comput. Electron. Commer..

[204]  Marc Langheinrich,et al.  The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .

[205]  Elizabeth Sillence,et al.  Developing Trust Practices for E-Health , 2007 .

[206]  Charles J. Kacmar,et al.  Trust in e-commerce vendors: a two-stage model , 2000, ICIS.

[207]  Achim D. Brucker,et al.  Extending access control models with break-glass , 2009, SACMAT '09.

[208]  S. Gregor,et al.  Measuring Human-Computer Trust , 2000 .

[209]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[210]  Yiming Yang,et al.  An Evaluation of Statistical Approaches to Text Categorization , 1999, Information Retrieval.

[211]  Scott Dick,et al.  P3P Adoption on E-Commerce Web sites: A Survey and Analysis , 2007, IEEE Internet Computing.

[212]  Francisco Curbera,et al.  Web Services Business Process Execution Language Version 2.0 , 2007 .

[213]  Nicola Zannone,et al.  Privacy-Aware Web Service Composition and Ranking , 2013, 2013 IEEE 20th International Conference on Web Services.

[214]  Fabian Hungerland,et al.  The Digital Economy , 2021, Introduction to Digital Economics.

[215]  Dhp Dirk Gerrits Pushing and pulling : computing push plans for disk-shaped robots, and dynamic labelings for moving points , 2013 .

[216]  Barbara Carminati,et al.  A Privacy-Preserving Approach for Web Service Selection and Provisioning , 2011, 2011 IEEE International Conference on Web Services.

[217]  Jerry R. Hobbs The Generic Information Extraction System , 1993, MUC.

[218]  Phongphun Kijsanayothin,et al.  Privacy and Recovery in Composite Web Service Transactions , 2010 .

[219]  Fei-Yu Xu,et al.  Bootstrapping relation extraction from semantic seeds , 2008 .

[220]  Sholom M. Weiss,et al.  Automated learning of decision rules for text categorization , 1994, TOIS.

[221]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[222]  R. Bakhshi Gossiping Models : Formal Analysis of Epidemic Protocols , 2011 .

[223]  Tim K. Cocx,et al.  Metrics and visualisation for crime analysis and genomics , 2005 .

[224]  Chih-Chien Wang,et al.  Knowledge and Trust in E-consumers' Online Shopping Behavior , 2008, 2008 International Symposium on Electronic Commerce and Security.

[225]  Sander van der Burg,et al.  A Reference Architecture for Distributed Software Deployment , 2013 .

[226]  Sabrina De Capitani di Vimercati,et al.  Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.

[227]  M Muhammad Atif,et al.  Formal modeling and verification of distributed failure detectors , 2011 .

[228]  Georgeta Igna,et al.  Performance analysis of real-time task systems using timed automata , 2013 .

[229]  Marco Vieira,et al.  Integrated Intrusion Detection in Databases , 2007, LADC.

[230]  van den,et al.  Composition and synchronization of real-time components upon one processor , 2013 .

[231]  van Pja Paul Tilburg From computability to executability : a process-theoretic view on automata theory , 2011 .

[232]  David R. Karger,et al.  Tackling the Poor Assumptions of Naive Bayes Text Classifiers , 2003, ICML.

[233]  Jerry den Hartog,et al.  Database anomalous activities detection and quantification , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[234]  Michael Gertz,et al.  DEMIDS: A Misuse Detection System for Database Systems , 2000, IICIS.

[235]  Diego Calvanese,et al.  Synthesis of underspecified composite e-services based on automated reasoning , 2004, ICSOC '04.

[236]  Andrew McCallum,et al.  A comparison of event models for naive bayes text classification , 1998, AAAI 1998.

[237]  Miguel E. Andrés,et al.  Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems , 2011, ArXiv.

[238]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[239]  Weider D. Yu,et al.  PPMLP: A Special Modeling Language Processor for Privacy Policies , 2007, 2007 12th IEEE Symposium on Computers and Communications.

[240]  L. Macía,et al.  A Charter of Fundamental Rights for the European Union , 2000 .

[241]  Wolfgang Nejdl,et al.  A hybrid approach for efficient Web service composition with end-to-end QoS constraints , 2012, TWEB.

[242]  Clare-Marie Karat,et al.  An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench , 2006, SOUPS '06.

[243]  Oleksiy Mazhelis,et al.  One-class classifiers : a review and analysis of suitability in the context of mobile-masquerader detection , 2006, South Afr. Comput. J..

[244]  Peter E. Hart,et al.  Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.

[245]  Michael Meier,et al.  Learning SQL for Database Intrusion Detection using Context-Sensitive Modelling , 2009, LWA.

[246]  Janine S. Hiller The Regulatory Framework for Privacy and Security , 2009 .

[247]  Rolf Schwitter,et al.  English as a formal specification language , 2002, Proceedings. 13th International Workshop on Database and Expert Systems Applications.

[248]  Anneli Folkesson,et al.  World Wide Web Consortium (W3C) , 2005 .

[249]  Jerry den Hartog,et al.  A machine learning solution to assess privacy policy completeness: (short paper) , 2012, WPES '12.

[250]  Mark Timmer,et al.  Efficient modelling, generation and analysis of Markov automata , 2013 .

[251]  Elisa Bertino,et al.  Detecting anomalous access patterns in relational databases , 2008, The VLDB Journal.

[252]  Henry Farrell,et al.  Constructing the International Foundations of E-Commerce—The EU-U.S. Safe Harbor Arrangement , 2003, International Organization.

[253]  Jan de Leeuw,et al.  Gifi Methods for Optimal Scaling in R: The Package homals , 2009 .

[254]  B. J. Arnoldus,et al.  An illumination of the template enigma : software code generation with templates , 2011 .

[255]  Ralph L. Keeney,et al.  Book Reviews : Scientific Opportunities and Public Needs: Improv ing Priority Setting and Public Input at the National Institutes of Health. Institute of Medicine. Washington, DC: National Academy Press, 1998, 136 pages, $26.00 , 1998 .