Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Computerized performance monitoring systems: use and abuse
Communications of the ACM
The design of the UNIX operating system
The design of the UNIX operating system
A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
Networks without user observability
Computers and Security
Building a secure computer system
Building a secure computer system
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
The personal model of data: towards a privacy-oriented information system
Computers and Security
A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
The social impact of computers
The social impact of computers
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A proposal for a new block encryption standard
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Handbook of personal data protection
Handbook of personal data protection
Lattice-based enforcement of Chinese Walls
Computers and Security
On blind signatures and perfect crimes
Computers and Security
Identity verification and biometrics
Computer security reference book
Fundamentals of computer security technology
Fundamentals of computer security technology
Database security
An approach to authorization modeling in object-oriented database systems
Data & Knowledge Engineering
Report of an integrity research study group
Computers and Security
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Role-Based Access Control Models
Computer
Security in computing
Privacy, information technology, and health care
Communications of the ACM
Web security & commerce
Location management strategies increasing privacy in mobile communication
Information systems security
Design of secure medical database systems
Information systems security
Risks on the way to the global information society (abstract)
Information systems security
The intrusion detection system AID—architecture, and experiences in automated audit analysis
Proceedings of the IFIP TC6/TC11 international conference on Communications and multimedia security II
Role-based access control in ORACLE7 and Trusted ORACLE7
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Convergence revisited: toward a global policy for the protection of personal data?
Technology and privacy
A compile-time model for safe information flow in object-oriented databases
SEC'97 Proceedings of the IFIP TC11 13 international conference on Information Security (SEC '97) on Information security in research and business
Pseudonymous audit for privacy enhanced intrusion detection
SEC'97 Proceedings of the IFIP TC11 13 international conference on Information Security (SEC '97) on Information security in research and business
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Computer security
Communications of the ACM
Consistent, yet anonymous, Web access with LPWA
Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
A Model for Evaluation and Administration of Security in Object-Oriented Databases
IEEE Transactions on Knowledge and Data Engineering
Information Flow Control in Object-Oriented Systems
IEEE Transactions on Knowledge and Data Engineering
A Payment Scheme for Mixes Providing Anonymity
TREC '98 Proceedings of the International IFIP/GI Working Conference on Trends in Distributed Systems for Electronic Commerce
Addressing Vulnerability and Privacy Problems generated by the Use of IT-Security Mechanisms
Proceedings of the IFIP 12th World Computer Congress on Education and Society - Information Processing '92 - Volume 2 - Volume 2
Breakthroughs in Standardization of IT Security Criteria
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy
Rights in an Object-Oriented Environment
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
A new Authorization Model for Object-Oriented Databases
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
An Authorization Model for Workflows
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Role Hierarchies and Constraints for Lattice-Based Access Controls
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Illich and ashore
Proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Illich and ashore
On the Cutting Edge between Privacy and Security
Proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Illich and ashore
Proceedings of the First International Workshop on Information Hiding
MIXes in Mobile Communication Systems: Location Management with Privacy
Proceedings of the First International Workshop on Information Hiding
The global information society and electronic commerce: Privacy threats and privacy technologies
Proceedings of the IFIP TC9 World Conference on Human Choice and Computers: Computers and Networks in the Age of Globalization
Access Controls by Object-Oriented Concepts
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Access Control: The Neglected Frontier
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy
Privacy and Computing: a Cultural Perspective
Proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Illich and ashore
Privacy-enhancing technologies for the Internet
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
Electronic cash on the Internet
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Distributed audit trail analysis
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Crowds: Anonymity for Web Transactions
Crowds: Anonymity for Web Transactions
Security for Object-Oriented Database Systems
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Preserving privacy in a network of mobile computers
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Extensions of packet communication technology to a hand held personal terminal
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
E-P3P privacy policies and privacy authorization
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
A Privacy Policy Model for Enterprises
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Proceedings of the 2002 workshop on New security paradigms
Data protection and data sharing in telematics
Mobile Networks and Applications
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
A privacy enhancing mechanism based on pseudonyms for identity protection in location-based services
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
The motivation and proposition of a privacy-enhancing architecture for operational databases
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
A middleware architecture for privacy protection
Computer Networks: The International Journal of Computer and Telecommunications Networking
SQL's revoke with a view on privacy
Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Linkability estimation between subjects and message contents using formal concepts
Proceedings of the 2007 ACM workshop on Digital identity management
Taking account of privacy when designing cloud computing services
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
On the operational semantics of rights expression languages
Proceedings of the nineth ACM workshop on Digital rights management
Privacy-aware role-based access control
ACM Transactions on Information and System Security (TISSEC)
Policy framework for security and privacy management
IBM Journal of Research and Development
Privacy requirements engineering for trustworthy e-government services
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity
ProvSec'10 Proceedings of the 4th international conference on Provable security
Towards defining semantic foundations for purpose-based privacy policies
Proceedings of the first ACM conference on Data and application security and privacy
A soft computing approach for privacy requirements engineering: The PriS framework
Applied Soft Computing
HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
Privacy-preserving storage and access of medical data through pseudonymization and encryption
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Person-Wise privacy level access control for personal information directory services
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Extending SQL to allow the active usage of purposes
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
An ontology-based approach for managing and maintaining privacy in information systems
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part I
Privacy injector — automated privacy enforcement through aspects
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Using purpose lattices to facilitate customisation of privacy agreements
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Conditional privacy-aware role based access control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Authorization architectures for privacy-respecting surveillance
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |