wwwdse.doc.ic.ac.uk/research/policies/index.shtml
Elahi, T.E., Pearson, S., 2007. Privacy assurance: Bridging
the gap between preference and practice. In: TrustBus,
pp. 65–74.
Electronic Frontier Foundation (EFF), 2012. TOSBack:
The Terms of Service Tracker, http://
www.tosback.org/ timeline.php
EnCoRe project, 2012. www.encore-project.info
Gellman, R., 2009. Privacy in the Clouds: Risks to Privacy
and Confidentiality from Cloud Computing, World
Privacy Forum, www.worldprivacyforum.org/pdf/
WPF_Cloud_Privacy_Report.pdf
Hawkey, K., Inkpen, K. Examining the content and
privacy of web browsing incidental information. In
WWW ’06, pp. 123–132, New York, NY, USA.
Holtz, L.E., Zwingelberg, H., Hansen, M., 2011. Privacy
Policy Icons. In: Privacy and Identity Management for
Life, Camenisch, J., Fischer-Hübner, S., Rannenberg,
K. (eds.), Springer, pp. 279-285.
Holtz, L.E., Schallaböck, 2011. Legal Policy Mechanisms.
In: Privacy and Identity Management for Life,
Camenisch, J., Fischer-Hübner, S., Rannenberg, K.
(eds.), Springer, pp. 343-354.
IBM, 2004. The Enterprise Privacy Authorization
Language (EPAL), EPAL specification, v1.2, http://
www.zurich.ibm.com/security/enterprise-privacy/epal/
IBM, 2006. REALM project, http://www.zurich.ibm.com/
security/publications/2006/REALM-at-IRIS2006-2006
0217.pdf
IBM, 2007. Sparcle project, http://domino.research.
ibm.com/comm/research_projects.nsf/pages/sparcle.in
dex.html
Iachello, G., Hong, J. End-User Privacy in Human-
Computer Interaction. Now Publishers Inc., Hanover,
MA, USA, 2007.
Irwin, K., Yu, T., 2005. Determining user privacy
preferences by asking the right questions: an
automated approach. In WPES ’05: Proceedings of the
2005 ACM workshop on Privacy in the electronic
society, pp. 47–50, New York, NY, USA, ACM.
Jaatun, M.G., Tϕndel, I.A., Bernsmed, K., Nyre, A.A.,
2012. Privacy Enhancing Technologies for
Information Control. In: Privacy Protection Measures
and Technologies in Business Organisations, G. Yee
(ed.), pp. 1-31, IGI Global.
Kelley, P.G., Bresee, J., Cranor, L.F., Reeder, R.W., 2009.
A “nutrition label” for privacy. In: SOUPS ’09:
Proceedings of the 5th Symposium on Usable Privacy
and Security, pp. 1–12, New York, NY, USA.
Kenny, S., Borking, J., 2002. The Value of Privacy
Engineering. Journal of Information, Law and
Technology (JILT), 1. http://elj.warwick.ac.uk/jilt/02-/
kenny.html.
Kobsa, A., 2003. A component architecture for
dynamically managing privacy constraints in
personalized web-based systems. In Privacy
Enhancing Technologies, Third International
Workshop, PET 2003, Dresden, Germany, March 26-
28, 2003, Revised
Papers, LNCS 2760, Springer, pp.
177–188.
MobiLife project. http://www.ist-mobilife.org/
Mowbray, M., 2009. The Fog over the Grimpen Mire:
Cloud Computing and the Law. SCRIPT-ed J Law
Technol Soc, 6(1), pp. 132-146.
OASIS, 2012. XACML, http://www.oasis-open.org/
committees/tc_home.php?wg_abbrev=xacml
Organisation for Economic Co-operation and
Development (OECD), 1980. Guidelines Governing
the Protection of Privacy and Transborder Flow of
Personal Data, OECD, Geneva.
Papanikolaou, N., Creese, S., Goldsmith, M., Casassa
Mont, M., Pearson, S., 2010. ENCORE: Towards a
holistic approach to privacy, Proc. SECRYPT.
Papanikalaou, N., Pearson, S., Casassa Mont, M., 2011.
Towards Natural-Language Understanding and
Automated Enforcement of Privacy Rules and
Regulations in the Cloud: Survey and Bibliography.
Secure and Trust Computing, Data Management and
Applications, Communications in Computer and
Information Science, 187, Springer, pp. 166-173.
Patrick, A.S., Kenny, S., 2003. From privacy legislation to
interface design: Implementing information privacy in
human-computer interactions. In Privacy Enhancing
Technologies, LNCS 2760, Springer, pp. 107–124.
Parsons, C., 2010. APIs, End-Users, and the Privacy
Commons, http://www.christopher-parsons.com/blog/
privacy/apis-end-users-and-the-privacy-commons/
Pearson, S., 2011. Privacy Models and Languages:
Assurance Checking Policies. Digital Privacy, ed. J.
Camenisch, D. Sommer and R. Leenes, LNCS 6545,
Springer, pp. 363-375.
Pearson, S., Casassa Mont, M., Chen, L., Reed, A., 2011.
End-to-End Policy-Based Encryption and
Management of Data in the Cloud. In: Proc.
CloudCom 2011, IEEE.
Pearson, S., Casassa Mont, M., 2011. Sticky Policies: An
Approach for Privacy Management across Multiple
Parties, IEEE Computer, 44(9), IEEE, pp. 60-68.
Pearson, S., 2010. Addressing Complexity in a Privacy
Expert System. In: E. Hüllermeier, R. Kruse, and F.
Hoffmann (Eds.), Proc. IPMU 2010, Part II, CCIS 81,
Springer, pp. 612–621.
Pettersson, J.S., et al, 2005. Making PRIME Usable. In
SOUPS ’05, New York, pp. 53–64.
Privacy Commons, 2012. Privacy Commons Incubator,
http://groups.google.com/group/privacy-commons-in
cubator/browse_thread/thread/28c56ad776f37cb2?hl=
en
Rundle, M., 2006. International data protection and digital
identity management tools. Presentation at IGF 2006,
Privacy Workshop 1, Athens.
Schunter, M., Waidner, M., 2003.Platform for Enterprise
Privacy Practices, PET, LNCS 2482.
Spiekermann, S., Cranor, L., 2009. Engineering Privacy.
IEEE Transactions on Software Engineering, 35(1),
January/February.
Stanford University, 2012. WhatApp project. https://
whatapp.org/about
VOME project. http://www.vome.org.uk/
CLOSER2012-2ndInternationalConferenceonCloudComputingandServicesScience
660