共 21 条
- [1] Alpern B., Schneider F., Dening Liveness, Information Processing Letters, 21, 4, pp. 181-185, (1985)
- [2] Accorsi R., Automated privacy audits to complement the notion of control for identity management, Proc. IFIP Conf. On Policies and Research in Identity Management, 261, pp. 39-48, (2008)
- [3] Amazon EC2 Service Level Agreement, (2010)
- [4] Buneman P., Khanna S., Tan W.-C., Why and where: A char-acterization of data provenance, Int'l Conf. On Database Theory ICDT 2001 LNCS 1973, pp. 316-330, (2001)
- [5] Cox I.J., Miller M.L., Bloom J.A., Fridrich J., Kalker T., Dig-ital watermarking and steganography, Morgan Kaufmann, (2008)
- [6] The protection of individuals with regard to the processing of personal data and on the free movement of such data, Ofcial Journal of the European Communities L, 281, pp. 31-50, (1995)
- [7] Google. Google Health Privacy Policy, (2009)
- [8] Google. Terms of Service, (2010)
- [9] Hilty M., Basin D., Pretschner A., On obligations, Euro-pean Symp. On Research in Computer Security ESORICS, 3679, pp. 98-117, (2005)
- [10] Kerschbaum F., Building a privacy-preserving benchmarking en-terprise system, Enterprise Information Systems, 2, 4, pp. 421-441, (2008)