Anonymous Web transactions with Crowds
Communications of the ACM
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Privacy: What Developers and IT Professionals Should Know
Privacy: What Developers and IT Professionals Should Know
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Securing Information Transfer in Distributed Computing Environments
IEEE Security and Privacy
Communications of the ACM - Organic user interfaces
IEEE Transactions on Software Engineering
Taking account of privacy when designing cloud computing services
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
Data Protection-Aware Design for Cloud Services
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Accountability as a Way Forward for Privacy Protection in the Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
A Privacy Impact Assessment Tool for Cloud Computing
CLOUDCOM '10 Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science
Privacy and Identity Management for Life
Privacy and Identity Management for Life
Privacy management for global organizations
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Enhancing privacy in cloud computing via policy-based obfuscation
The Journal of Supercomputing
A formal approach for inspecting privacy and trust in advanced electronic services
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Hi-index | 0.00 |
Meeting privacy requirements can be challenging for global organisations, particularly where future Internet service provision models are involved. In this paper approaches will be explained that can be used to help address these issues, with a focus on some of the solutions that the author has been involved in developing in HP Labs that are currently being used, rolled out or are the subjects of further research.