Supporting negotiation mechanism privacy authority method in cloud computing
Tài liệu tham khảo
P. Mell, T. Grance, Draft NIST Working Definition of Cloud Computing, Referenced on June 3rd, 2009. <http://csrc.nist.gov/groups/SNS/cloud-computing/index.html>.
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, Above the Clouds: a Berkeley View of Cloud Computing, University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, February 2009.
Louis D. Brandeis, Samuel D. Warren, Steven Alan Childress, The Right to Privacy.
I. Goldberg, D. Wagner, E. Brewer. Privacy-Enhancing Technologies for the Internet, Proceedings, in: Proceedings of the 42nd IEEE International Computer Conference(COMPCON’97), 1997, pp. 103–109.
F. Xiao, Z. Huang, Z. Cao, J. Hu, L, Liu, Modeling cost-aware Web services composition using PTCCS, in: Proceeding of the International Conference on Web Service (ICWS 2009), 2009.
G. Yee, L. Korba, Privacy policy compliance for Web services, in: Proceedings of 2004 IEEE International Conference on Web Services (ICWS 2004), 2004, pp. 158–165.
Zhang, 2007, Toward a service-oriented development through a case study, IEEE Transaction on Systems Man, Cybernetics, Part A, 37, 955, 10.1109/TSMCA.2007.904820
S. Pearson, Taking account of privacy when designing cloud computing services, in: ICSE-Cloud’09, Vancouver, IEEE, Also Available as HP Labs Technical Report, HPL-2009-54.
S. Pearson, A. Charlesworth, Accountability as a Way Forward for Privacy Protection in the Cloud, HP Labs Technical Report, HPL-2009-178.
R. Hamadi, H.Y. Paik, B. Benatallah, Conceptual modeling of privacy-aware Web service protocols, in: Proceeding of the 19th International Conference on Advanced Information System Engineering (CAiSE 2007), 2007, pp. 233–248.
N. Guermouche, S. Benbernou, E. Coquery, M.S. Hacid, Privacy-aware Web service protocol replaceability, in: Proceeding of the International conference on Web services (ICWS 2007), 2007, pp.1048–1055.
K. Mokhtari, S. Benbernou, M. Hacid, E. Coquery, F. Leymann, Verification of privacy timed properties in Web service protocols, in: Proc. of the IEEE In’l Conf. on Services Computing(SCC 2008), 2008, pp. 593–594.
Liu, 2011, Minimal privacy authorization in web services collaboration, Computer Standards & Interfaces, 33, 332, 10.1016/j.csi.2010.09.001
A. Barth, J. Mitchell, A. Datta, S. Sundaram, Privacy and utility in business processes. In: Proc. of the 20th IEEE Computer Security Foundations Symp. (CSF 2007), 2007, pp. 279–294.
Zhiqiang, 2010, Research on privacy-protection policy for pervasive computing, Chinese Journal of Computers., 33, 128, 10.3724/SP.J.1016.2010.00128
Zhu, 2006, Role-based collaboration and its kernel mechanisms, IEEE Transaction on Systems, Man, Cybernetics, Part C, 36, 578, 10.1109/TSMCC.2006.875726
K. El-Khatib, A privacy negotiation protocol for web services, in: Workshop on Collaboration Agents: Autonomous Agents for Collaborative Environments Halifax, 2003, pp. 85–92.
Yan, 2009, Parsimonious semantic trust negotiation, Chinese journal of computers, 32, 1989
Kolter, 2010, Visualizing past personal data disclosures, ARES, 131
Liu, 2011, Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms, Expert Systems with Applications, 38, 4540, 10.1016/j.eswa.2010.09.128
T. Yu, Y. Zhang, K.J. Lin, Modeling and measuring privacy risks in QoS Web services, in: Proceeding of 8th IEEE International Conference on E-Commerce Technology (CEC 2006)/3th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (EEE 2006), 4.
Jason I. Hong, Jennifer D. Ng, Scott Lederer, James A. Landay, Privacy risk models for designing privacy-sensitive ubiquitous computing systems, Conference on Designing Interactive Systems, 2004, pp. 91–100.
Ni, 2012, Clustering-oriented privacy-preserving data publishing, Knowledge-Based Systems, 264, 10.1016/j.knosys.2012.05.012
David E. Bakken, Rupa Parameswaran, Douglas M. Blough, Andy A. Franz, Ty J. Palmer: Data Obfuscation: Anonymity and Desensitization of Usable Data Sets. IEEE Security & Privacy 2 (6) (2004) 34–41.
Bao, 2001, An efficient and practical scheme for privacy protection in the e-commerce of digital goods, Information Security and Cryptology—ICISC, 2000, 162
B. Gilburd, A. Schuster, R. Wolff, k-TTP: a new privacy model for large-scale distributed environments, in: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 2004, pp. 563–568.
Ye, 2013, Anonymizing classification data using rough set theory, Knowledge-Based Systems, 10.1016/j.knosys.2013.01.007
Sweeney, 2002, Achieving k-anonymity privacy protection using generalization and suppression, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 571, 10.1142/S021848850200165X
HaiHua, 2008, A capability enhanced trust evaluation model for web services, Chinese Journal of Computers, 31, 1473