A Privacy-Enhancing e-Business Model Based on Infomediaries
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Web Privacy with P3p
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
An Audit Logic for Accountability
POLICY '05 Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services
DASC '06 Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
Data collection with self-enforcing privacy
Proceedings of the 13th ACM conference on Computer and communications security
The Sarbanes-Oxley Act: implications for large-scale IT outsourcing
Communications of the ACM - Emergency response information systems: emerging trends and technologies
Analyzing Regulatory Rules for Privacy and Security Requirements
IEEE Transactions on Software Engineering
How to generate and exchange secrets
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
Human-Computer Interaction
Trusted virtual platforms: a key enabler for converged client devices
ACM SIGOPS Operating Systems Review
Taking account of privacy when designing cloud computing services
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
Jurisdiction and the Internet: Regulatory Competence over Online Activity
Jurisdiction and the Internet: Regulatory Competence over Online Activity
A client-based privacy manager for cloud computing
Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE
The future of UK data protection regulation
Information Security Tech. Report
Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy
iTrust'05 Proceedings of the Third international conference on Trust Management
A systemic approach to automate privacy policy enforcement in enterprises
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Privacy assurance: bridging the gap between preference and practice
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Data protection models for service provisioning in the cloud
Proceedings of the 15th ACM symposium on Access control models and technologies
Semantic similarity model for risk assessment in forming cloud computing SLAs
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Furthering the growth of cloud computing by providing privacy as a service
ICT-GLOW'11 Proceedings of the First international conference on Information and communication on technology for the fight against global warming
A privacy preserving authorisation system for the cloud
Journal of Computer and System Sciences
TrustGK monitor: 'customer trust as a service' for the cloud
Proceedings of the CUBE International Information Technology Conference
SAPDS: self-healing attribute-based privacy aware data sharing in cloud
The Journal of Supercomputing
Privacy management in global organisations
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Beyond lightning: A survey on security challenges in cloud computing
Computers and Electrical Engineering
International Journal of Web Services Research
Managing SaaS Risk in Higher Education Organisations: A Case Study
International Journal of E-Business Research
Hi-index | 0.00 |
The issue of how to provide appropriate privacy protection for cloud computing is important, and as yet unresolved. In this paper we propose an approach in which procedural and technical solutions are co-designed to demonstrate accountability as a path forward to resolving jurisdictional privacy and security risks within the cloud.