Cryptographic alias e-mail addresses for privacy enforcement in business outsourcing
Proceedings of the 2005 workshop on Digital identity management
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
Purpose based access control for privacy protection in relational database systems
The VLDB Journal — The International Journal on Very Large Data Bases
PuRBAC: Purpose-Aware Role-Based Access Control
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Formal consistency verification between BPEL process and privacy policy
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Optimal Privacy-Aware Path in Hippocratic Databases
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Privacy and consent in pervasive networks
Information Security Tech. Report
Privacy-aware role-based access control
ACM Transactions on Information and System Security (TISSEC)
Privacy-aware access control with generalization boundaries
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Conditional purpose based access control model for privacy protection
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
A conditional purpose-based access control model with dynamic roles
Expert Systems with Applications: An International Journal
Towards defining semantic foundations for purpose-based privacy policies
Proceedings of the first ACM conference on Data and application security and privacy
A conceptual framework for information security and privacy
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Privacy preservation and protection by extending generalized partial indices
BNCOD'06 Proceedings of the 23rd British National Conference on Databases, conference on Flexible and Efficient Information Handling
A role-involved purpose-based access control model
Information Systems Frontiers
Conditional privacy-aware role based access control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
A Privacy Agreement Negotiation Model in B2C E-Commerce Transactions
International Journal of Information Security and Privacy
Engineering Financial Enterprise Content Management Services: Integration and Control
International Journal of Systems and Service-Oriented Engineering
Hi-index | 0.00 |
Many electronic payment systems have been developed to facilitate the purchase of goods and services over the Internet.For the class of goods and services that can be categorized as low-value transactions, they require electronic payment systems that ...