- Barbara Carminati
, Elena Ferrari
:
Trusted Privacy Manager: A System for Privacy Enforcement. ICDE Workshops 2005: 1195 - Jaijit Bhattacharya, S. K. Gupta:
EPAL Based Privacy Enforcement Using ECA Rules. ICISS 2005: 120-133 - Adam Barth, John C. Mitchell:
Enterprise privacy promises and enforcement. WITS 2005: 58-66 - Narjès Boufaden, William Elazmeh, Stan Matwin, Nathalie Japkowicz:
PEEP- Privacy Enforcement in Email Project. PST 2005 - Marco Casassa Mont
, Robert Thyne, Pete Bramhall:
Privacy Enforcement for IT Governance in Enterprises: Doing It for Real. TrustBus 2005: 226-235 - 2004
- Paul Ashley:
Enforcement of a P3P Privacy Policy. AISM 2004: 11-26 - Marius-Calin Silaghi, Debasis Mitra
:
Distributed Constraint Satisfaction and Optimization with Privacy Enforcement. IAT 2004: 531-535 - Katia Hayati, Martín Abadi:
Language-Based Enforcement of Privacy Policies. Privacy Enhancing Technologies 2004: 302-313 - Ronald van Eijk, Mortaza S. Bargh, Alfons H. Salden, Peter Ebben:
Privacy Enforcement Embedded in Mobile Services. Wireless Information Systems 2004: 42-49 - 2003
- David E. Gobuty:
Organizing security and privacy enforcement in medical imaging technology. CARS 2003: 319-329 - 1981
- David A. Bonyun:
The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security. S&P 1981: 19-25