Journal: IBM Journal of Research and Development

Volume 53, Issue 2

1 -- 0D. A. Chapin, A. C. Nelson, Ben S. Gerber. A technology perspective on worldwide privacy regulations
2 -- 0S. D. Hennessy, G. D. Lauer, Nev Zunic, Ben S. Gerber, A. C. Nelson. Data-centric security: Integrating data privacy and data security
3 -- 0Elisa Bertino, Carolyn Brodie, Seraphin B. Calo, Lorrie Faith Cranor, Clare-Marie Karat, John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni, Prathima Rao, Xiping Wang. Analysis of privacy and security policies
4 -- 0John Karat, Clare-Marie Karat, Elisa Bertino, Ninghui Li, Qun Ni, Carolyn Brodie, Jorge Lobo, Seraphin B. Calo, Lorrie Faith Cranor, Ponnurangam Kumaraguru, Robert W. Reeder. Policy framework for security and privacy management
5 -- 0Paul A. Karger, Gaurav S. Kc, David C. Toll. Privacy is essential for secure mobile devices
6 -- 0Shari Lawrence Pfleeger, Charles P. Pfleeger. Harmonizing privacy with security principles and practices
7 -- 0Camilo H. Viecco, Alex Tsow, L. Jean Camp. A privacy-aware architecture for a Web rating system
8 -- 0Benjamin D. Renegar, Katina Michael. Privacy-value-control harmonization for RFID adoption in retail
9 -- 0Sangeetha Seshadri, Ling Liu, Lawrence Chiu. Recovery scopes, recovery groups, and fine-grained recovery in enterprise storage controllers with multi-core processors