Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Conflict and combination in privacy policy languages
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
A Semantic Web approach to the provenance challenge
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
Web science: an interdisciplinary approach to understanding the web
Communications of the ACM - Web science
Privacy policies compliance across digital identity management systems
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Formal Aspects in Security and Trust
Proceedings of the 7th international conference on Mobile systems, applications, and services
Communications of the ACM
Policy-Aware Content Reuse on the Web
ISWC '09 Proceedings of the 8th International Semantic Web Conference
Privacy enhancements for mobile and social uses of consumer electronics
IEEE Communications Magazine
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Relevance, derogation and permission: a case for a normal form for codes of norms
DEON'10 Proceedings of the 10th international conference on Deontic logic in computer science
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies
The Foundations for Provenance on the Web
Foundations and Trends in Web Science
A provenance-based compliance framework
FIS'10 Proceedings of the Third future internet conference on Future internet
Norm-system revision: theory and application
Artificial Intelligence and Law
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
Transactions on Data Privacy
Audit mechanisms for privacy protection in healthcare environments
HealthSec'11 Proceedings of the 2nd USENIX conference on Health security and privacy
Towards a formal model of accountability
Proceedings of the 2011 workshop on New security paradigms workshop
Privacy management for global organizations
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
The market failure of anonymity services
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Understanding and protecting privacy: formal semantics and principled audit mechanisms
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Augmenting the web with accountability
Proceedings of the 21st international conference companion on World Wide Web
A compliance management ontology: developing shared understanding through models
CAiSE'12 Proceedings of the 24th international conference on Advanced Information Systems Engineering
Enabling robust information accountability in E-healthcare systems
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
Privacy management in global organisations
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Data usage control enforcement in distributed systems
Proceedings of the third ACM conference on Data and application security and privacy
Privacy by design: a formal framework for the analysis of architectural choices
Proceedings of the third ACM conference on Data and application security and privacy
Patch Release Behaviors of Software Vendors in Response to Vulnerabilities: An Empirical Analysis
Journal of Management Information Systems
Generalizing database forensics
ACM Transactions on Database Systems (TODS)
On scaling up sensitive data auditing
Proceedings of the VLDB Endowment
Agent-based accountable grid computing systems
The Journal of Supercomputing
Accountability and deterrence in online life
Proceedings of the 3rd International Web Science Conference
Mathematical practice, crowdsourcing, and social machines
CICM'13 Proceedings of the 2013 international conference on Intelligent Computer Mathematics
Information Polity
Accountability and Q-Accountable Logging in Wireless Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.02 |
With access control and encryption no longer capable of protecting privacy, laws and systems are needed that hold people accountable for the misuse of personal information, whether public or secret.