Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection
暂无分享,去创建一个
Jingsha He | K. P. Chow | Fei Xu | Xu Wu
[1] Gerardo Canfora,et al. A Three Layered Model to Implement Data Privacy Policies , 2008, WOSIS.
[2] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[3] Rudolf Schmid,et al. Organization for the advancement of structured information standards , 2002 .
[4] Dimitra I. Kaklamani,et al. A middleware architecture for privacy protection , 2007, Comput. Networks.
[5] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[6] Vasilios Zorkadis,et al. A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls , 2002, InfraSec.
[7] Jingsha He,et al. A Privacy-Enhanced Access Control Model , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[8] Debra Herrmann,et al. Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI , 2007 .
[9] Chris Weber,et al. Privacy Defended: Protecting Yourself Online , 2002 .
[10] Jorge Lobo,et al. Conditional Privacy-Aware Role Based Access Control , 2007, ESORICS.
[11] Sabah S. Al-Fedaghi,et al. Beyond Purpose-Based Privacy Access Control , 2007, ADC.
[12] Debra Herrmann,et al. Complete Guide to Security and Privacy Metrics , 2007 .
[13] S. Fischer-h bner. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .
[14] Jennifer Seberry,et al. Fundamentals of Computer Security , 2003, Springer Berlin Heidelberg.
[15] Simone Fischer-Hübner,et al. IT-Security and Privacy , 2001, Lecture Notes in Computer Science.
[16] Claire Wright,et al. Internet Law in Hong Kong , 2003 .