Distributed Access-Rights Management with Delegation Certificates, Secure Internet Programming, pp.211-235, 1999. ,
DOI : 10.1007/3-540-48749-2_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.6485
Why and Where: A Characterization of Data Provenance, ICDT 2001, pp.316-330, 2001. ,
DOI : 10.1007/3-540-44503-X_20
An Adaptive Privacy Management System for Data Repositories, TrustBus 2005, pp.236-245, 2005. ,
DOI : 10.1007/11537878_24
Blind Signatures for Untraceable Payments, Advances in Cryptology ? Proceedings of Crypto '82, pp.199-203, 1982. ,
DOI : 10.1007/978-1-4757-0602-4_18
Protecting patient privacy against unauthorized release of medical images in a group communication environment, Computerized Medical Imaging and Graphics, vol.29, issue.5, pp.367-383, 2005. ,
DOI : 10.1016/j.compmedimag.2005.02.003
Gesetz zur Modernisierung der gesetzlichen Krankenversicherung, Bundesgesetzblatt Jahrgang Teil I Nr, vol.55, 2003. ,
The Knowledge Complexity of Interactive Proof Systems, SIAM Journal on Computing, vol.18, issue.1, pp.186-208, 1989. ,
DOI : 10.1137/0218012
Privacy-enabled Services for Enterprises , 13th Int, Database and Expert Systems Applications, pp.483-487, 2002. ,
Information Flow Control and Applications ??? Bridging a Gap ???, LNCS, vol.2021, pp.153-172, 2001. ,
DOI : 10.1007/3-540-45251-6_9
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, 2009. ,
Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten, Informatik-Spektrum, vol.33, issue.1, 2010. ,
Asymmetric Fingerprinting, EUROCRYPT 1996, pp.84-95, 1996. ,
DOI : 10.1007/3-540-68339-9_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.7633
Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006. ,
DOI : 10.1145/1151030.1151053
Personalization in privacy-aware highly dynamic systems, Communications of the ACM, vol.49, issue.9, pp.32-38, 2006. ,
DOI : 10.1145/1151030.1151052