Indices
This title is listed in the following:
Close
Reference Hub
This research has been cited in:
Conference
Visual Analysis of Privacy Risks in Web ServicesIEEE International Conference on Web Services (ICWS 2007)10.1109/ICWS.2007.189 Conference
A privacy-preserving UBICOMP architectureProceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services10.1145/1501434.1501467 Conference
Measuring Privacy Protection in Web Services2006 IEEE International Conference on Web Services (ICWS'06)10.1109/ICWS.2006.87 Article
Keeping ubiquitous computing to yourself: A practical model for user control of privacyInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2005.04.008 Chapter
Conference
Deriving implementation-level policies for usage control enforcementProceedings of the second ACM conference on Data and Application Security and Privacy10.1145/2133601.2133612 Conference
Negotiated security policies for e-services and Web servicesIEEE International Conference on Web Services (ICWS'05)10.1109/ICWS.2005.85 Conference
Chapter
Conference
An Automatic Privacy Policy Agreement Checker for E-services2009 International Conference on Availability, Reliability and Security10.1109/ARES.2009.97 Chapter
Chapter
A Privacy Service for Comparison of Privacy and Trust Policies within SOAThreats, Countermeasures, and Advances in Applied Information Security10.4018/978-1-4666-0978-5.ch013 Chapter
Article
Towards Designing E-Services that Protect PrivacyInternational Journal of Secure Software Engineering10.4018/jsse.2010040102 Article
Estimating the Privacy Protection Capability of a Web Service ProviderInternational Journal of Web Services Research10.4018/jwsr.2009092202 Chapter
Close Top Results From Your Most Recent Search
Close