共 26 条
- [1] Pearson S., Taking account of privacy when designing cloud computing services, Proc. of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp. 44-52, (2009)
- [2] Warren S.D., Brandeis L.D., The right to privacy, Harvard Law Review, 4, 5, pp. 193-220, (1890)
- [3] Westin A., Privacy and Freedom, (1967)
- [4] Goldberg I., Wagner D., Brewer E., Privacy-Enhancing technologies for the Internet, Proc. of the 42nd IEEE Int'l Computer Conf., pp. 103-109, (1997)
- [5] Ke C.B., Huang Z.Q., Tang M., Supporting negotiation mechanism privacy authority method in cloud computing, Knowledge-Based Systems, 51, pp. 48-59, (2013)
- [6] Allison D.S., El Yamany H.F., Capretz M., Meta model for privacy policies within SOA, Proc. of the 2009 Int'l Conf. on Software Engineering (ICSE) Workshop on Software Engineering for Secure Systems, pp. 40-46, (2009)
- [7] OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, (2013)
- [8] Liu L.Y., Li Q., Zhu Y., Zhou H., Xiao F.X., Huang Z.Q., Specification and verification of privacy requirements in Web service compositions, Journal of PLA University of Science and Technology (Natural Science Edition), 13, 1, pp. 27-33, (2012)
- [9] Li Y.H., Paik H.Y., Benatallah B., Formal consistency verification between BPEL process and privacy policy, Proc. of the 2006 Int'l Conf. on Privacy, Security and Trust (PST): Bridge the Gap Between PST Technologies and Business Services, pp. 1-10, (2006)
- [10] Yan D., Tian Y., Huang J., Yang F., Privacy-Aware RBAC model for Web services composition, The Journal of China Universities of Posts and Telecommunications, 20, 1, pp. 30-34, (2013)