- Marc Sánchez Artigas:
Distributed Access Enforcement in P2P Networks: When Privacy Comes into Play. Peer-to-Peer Computing 2010: 1-10 - Kaniz Fatema, David W. Chadwick
, Stijn F. Lievens:
A Multi-privacy Policy Enforcement System. PrimeLife 2010: 297-310 - Shi-Cho Cha, Ren-Ting Ku, Ya-Ping Fu, Hao-Ping Lin:
On Generating RFID Privacy Policies in Consideration of Openness and Enforcement. SocialCom/PASSAT 2010: 897-905 - Michael Marhöfer, Robert Seidl:
Enforcement of Individual Privacy Policies by Communication Service Providers. Distributed Usage Control 2010 - 2009
- Ian Reay, Patricia Beatty, Scott Dick, James Miller:
Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies. Int. J. Inf. Secur. Priv. 3(4): 68-95 (2009) - John F. Buford, Xiaotao Wu, Saratchand Kanuri, Ratan Bajpai, Venkatesh Krishnaswamy:
Location Privacy Enforcement in a Location-Based Services Platform. CCNC 2009: 1-5 - Zhengping Wu, Lifeng Wang:
Enforcement of Privacy Policies over Multiple Online Social Networks for Collaborative Activities. SCSS 2009: 583-588 - Marc Sánchez Artigas, Pedro García López:
Pace: Privacy-Protection for Access Control Enforcement in P2P Networks. Globe 2009: 99-111 - Michael Siegenthaler, Ken Birman
:
Privacy enforcement for distributed healthcare queries. PervasiveHealth 2009: 1-6 - 2008
- Marco Casassa Mont
, Robert Thyne:
Privacy policy enforcement in enterprises with identity management solutions. J. Comput. Secur. 16(2): 133-163 (2008) - Peter Bodorik, Dawn N. Jutla:
Privacy with Web Serivces: Intelligence Gathering and Enforcement. Web Intelligence/IAT Workshops 2008: 546-549 - Thomas Scheffler, Stefan Geiß, Bettina Schnor:
An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies. SEC 2008: 157-171 - Yong Yang, Jian Yang
:
Towards Unconditional Anonymity: Privacy Enforcement Model in Web Services. SERVICES II 2008: 26-33 - Yuh-Jong Hu, Hong-Yi Guo, Guang-De Lin:
Semantic Enforcement of Privacy Protection Policies via the Combination of Ontologies and Rules. SUTC 2008: 400-407 - Timothy W. Finin, Lalana Kagal, Daniel Olmedilla:
Proceedings of the ISWC'07 Workshop on Privacy Enforcement and Accountability with Semantics (PEAS 2007), Busan, Korea, Nov. 12, 2007. CEUR Workshop Proceedings 320, CEUR-WS.org 2008 [contents] - 2007
- Yi Zheng, Dickson K. W. Chiu
, Hongbing Wang, Patrick C. K. Hung:
Towards a Privacy Policy Enforcement Middleware with Location Intelligence. EDOCW 2007: 97-104 - Vasu S. Alagar, Kaiyu Wan:
Context Based Enforcement of Authorization for Privacy and Security in Identity Management. IDMAN 2007: 25-37 - Paolo Cencioni, Roberto Di Pietro
:
VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol. MASS 2007: 1-6 - Georgios V. Lioudakis
, Eleftherios Koutsoloukas, Nikolaos L. Dellas, Francesca Gaudino, Dimitra I. Kaklamani, Iakovos S. Venieris:
Technical Enforcement of Privacy Legislation. PIMRC 2007: 1-6 - Bhavani Thuraisingham:
Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web. POLICY 2007: 8-11 - William Kwok-Wai Cheung, Yolanda Gil:
Privacy Enforcement through Workflow Systems in e-Science and Beyond. PEAS 2007 - 2006
- Chris Vanden Berghe, Matthias Schunter:
Privacy Injector - Automated Privacy Enforcement Through Aspects. Privacy Enhancing Technologies 2006: 99-117 - Mina Deng, Lothar Fritsch, Klaus Kursawe:
Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. Privacy Enhancing Technologies 2006: 172-189 - Marco Casassa Mont
, Robert Thyne:
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. Privacy Enhancing Technologies 2006: 118-134 - Xiangdong An, Dawn N. Jutla, Nick Cercone:
Dynamic inference control in privacy preference enforcement. PST 2006: 24 - Marco Casassa Mont
, Robert Thyne:
Privacy policy enforcement in enterprises with identity management solutions. PST 2006: 25 - Mahmoud Youssef
, Nabil R. Adam, Vijayalakshmi Atluri
:
Semantically enhanced enforcement of mobile consumer's privacy preferences. SAC 2006: 1172-1176 - Marco Casassa Mont
, Siani Pearson
, Robert Thyne:
A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises. TrustBus 2006: 91-102 - 2005
- Quintin Armour, William Elazmeh, Nour El-Kadri, Nathalie Japkowicz
, Stan Matwin:
Privacy Compliance Enforcement in Email. Canadian AI 2005: 194-204 - Masahisa Kawashima, Tsuyoshi Abe, Satoshi Minamoto, Tetsuya Nakagawa:
Cryptographic alias e-mail addresses for privacy enforcement in business outsourcing. Digital Identity Management 2005: 46-53