A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems
暂无分享,去创建一个
Gerald Quirchmayr | Kristian Beckers | Stefan Hofbauer | Kristian Beckers | G. Quirchmayr | S. Hofbauer
[1] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[2] Herbert Burkert,et al. Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .
[3] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[4] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[5] Dogan Kesdogan,et al. Privacy enhancing identity management: protection against re-identification and profiling , 2005, DIM '05.
[6] Daniel Zelterman,et al. Bayesian Artificial Intelligence , 2005, Technometrics.
[7] Patrick C. K. Hung,et al. Security Issues in VOIP Applications , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[8] Costas Lambrinoudakis,et al. An ontology description for SIP security flaws , 2007, Comput. Commun..
[9] Eduardo B. Fernández,et al. Security Patterns for Voice over IP Networks , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).
[10] Jinhua Guo,et al. Security Challenge and Defense in VoIP Infrastructures , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[11] Stefanos Gritzalis,et al. Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.
[12] S. Ehlert,et al. Specification-Based Denial-of-Service Detection for SIP Voice-over-IP Networks , 2008, 2008 The Third International Conference on Internet Monitoring and Protection.
[13] Bart De Decker,et al. Linking Privacy Solutions to Developer Goals , 2009, 2009 International Conference on Availability, Reliability and Security.
[14] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[15] Seda F. Gürses,et al. A critical review of 10 years of Privacy Technology , 2010 .
[16] Bernhard C. Witt. Datenschutz kompakt und verständlich , 2010 .
[17] Wouter Joosen,et al. A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.
[18] Christoph Sorge,et al. The Legal Ramifications of Call-Filtering Solutions , 2010, IEEE Security & Privacy.
[19] Gerald Quirchmayr,et al. CDRAS: An Approach to Dealing with Man-in-the-Middle Attacks in the Context of Voice over IP , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[20] Lorenzo Servitje. If it Looks Like a Duck , 2013 .