1 | -- | 0 | D. A. Chapin, A. C. Nelson, Ben S. Gerber. A technology perspective on worldwide privacy regulations |
2 | -- | 0 | S. D. Hennessy, G. D. Lauer, Nev Zunic, Ben S. Gerber, A. C. Nelson. Data-centric security: Integrating data privacy and data security |
3 | -- | 0 | Elisa Bertino, Carolyn Brodie, Seraphin B. Calo, Lorrie Faith Cranor, Clare-Marie Karat, John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni, Prathima Rao, Xiping Wang. Analysis of privacy and security policies |
4 | -- | 0 | John Karat, Clare-Marie Karat, Elisa Bertino, Ninghui Li, Qun Ni, Carolyn Brodie, Jorge Lobo, Seraphin B. Calo, Lorrie Faith Cranor, Ponnurangam Kumaraguru, Robert W. Reeder. Policy framework for security and privacy management |
5 | -- | 0 | Paul A. Karger, Gaurav S. Kc, David C. Toll. Privacy is essential for secure mobile devices |
6 | -- | 0 | Shari Lawrence Pfleeger, Charles P. Pfleeger. Harmonizing privacy with security principles and practices |
7 | -- | 0 | Camilo H. Viecco, Alex Tsow, L. Jean Camp. A privacy-aware architecture for a Web rating system |
8 | -- | 0 | Benjamin D. Renegar, Katina Michael. Privacy-value-control harmonization for RFID adoption in retail |
9 | -- | 0 | Sangeetha Seshadri, Ling Liu, Lawrence Chiu. Recovery scopes, recovery groups, and fine-grained recovery in enterprise storage controllers with multi-core processors |