Automated Privacy Audits to Complement the Notion of Control for Identity Management
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Provisional Authorizations , 2001, E-Commerce Security and Privacy.
[2] Rafael Accorsi,et al. On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems , 2006, SEC.
[3] Andreas Pfitzmann,et al. Multilateral Security: Enabling Technologies and Their Evaluation , 2001, Informatics.
[4] Alexander Pretschner,et al. Distributed usage control , 2006, CACM.
[5] Siani Pearson,et al. Towards Accountable Management of Privacy and Identity Information , 2003, ESORICS.
[6] Erin Kenneally. Digital logs - proof matters , 2004, Digit. Investig..
[7] Rafael Accorsi,et al. Personalization in privacy-aware highly dynamic systems , 2006, CACM.
[8] R. Accorsi,et al. On Privacy Evidence for UbiComp Environments , 2007 .
[9] Jens Strüker. Der gläserne Kunde im Supermarkt der Zukunft , 2007 .
[10] Bryan Pardo. Music information retrieval , 2006 .
[11] Adolf Hohl,et al. Delegating Secure Logging in Pervasive Computing Systems , 2006, SPC.
[12] A. Froomkin. The Death of Privacy? , 2000 .