The Right to Privacy, Harvard Law Review, vol.4, issue.5, 1890. ,
DOI : 10.2307/1321160
Privacy and Freedom, 1967. ,
A Taxonomy of Privacy, University of Pennsylvania Law Review, vol.154, issue.3, p.477, 2006. ,
DOI : 10.2307/40041279
Privacy as Contextual Integrity, Washington Law Review, pp.101-139, 2004. ,
Privacy, Security and Trust in Cloud Computing, Privacy and Security for Cloud Computing, Computer Communications and Networks, 2012. ,
DOI : 10.1007/978-3-642-14992-4_13
Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy, 2012. ,
Proposal for a Directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and the free movement of such data, 2012. ,
Privacy by Design, Privacy Protection Measures and Technologies in Business Organisations, pp.170-208, 2012. ,
DOI : 10.4018/978-1-61350-501-4.ch007
Privacy: What Developers and IT Professionals Should Know, 2004. ,
From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions, PET 2003, pp.107-124, 2003. ,
DOI : 10.1007/978-3-540-40956-4_8
Design for Privacy in Ubiquitous Computing Environments, Proc. 3rd conference on European Conference on Computer-Supported Cooperative Work, pp.77-92, 1993. ,
DOI : 10.1007/978-94-011-2094-4_6
Taking Account of Privacy when Designing Cloud Computing Services Wikipedia, http://en.wikipedia.org/wiki/Capability_Maturity_Model 24. The Institute of Internal Auditors: Managing and Auditing Privacy Risks, ICSE-Cloud'09, 2009. ,
DOI : 10.1109/cloud.2009.5071532
Data Protection-Aware Design for Cloud Computing, Proc. 1st CloudCom Beijing, Springer LNCS 5931, pp.119-130, 2009. ,
Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.1-42, 2008. ,
DOI : 10.1109/TSE.2008.88
Accountable privacy supporting services, Identity in the Information Society, pp.244-267, 2009. ,
DOI : 10.1007/s12394-009-0023-5
Information accountability, Communications of the ACM, vol.51, issue.6, 2008. ,
DOI : 10.1145/1349026.1349043
Economic Co-operation (APEC): APEC Privacy Framework, 2005. ,
The Australian Dodo Case: an insight for data protection regulation, World Data Protection Report BNA, vol.9, issue.1, 2009. ,
Accountability as a Way Forward for Privacy Protection in the Cloud, Proc. CloudCom Beijing, Springer LNCS 5931, pp.131-144, 2009. ,
DOI : 10.1007/978-3-642-10665-1_12
Privacy by Design, pp.405-413, 2010. ,
DOI : 10.4018/978-1-61350-501-4.ch007
Intraceable electronic mail, return addresses and digital pseudonyms, Communications of the ACM, 1981. ,
DOI : 10.1007/978-1-4615-0239-5_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210
Anonymous Web transactions with Crowds, Communications of the ACM, vol.42, issue.2, pp.32-48, 1999. ,
DOI : 10.1145/293411.293778
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.1585
Privacy Enhancing Technologies: A Review. HPL-2011-113 ,
Scalable, Accountable Privacy Management for Large Organisations, pp.168-175, 2009. ,
DOI : 10.1109/edocw.2009.5331996
Addressing Complexity in a Privacy Expert System, IPMU 2010, pp.612-621, 2010. ,
DOI : 10.1007/978-3-642-14058-7_63
A Decision Support System for Privacy Compliance In: Threats, Countermeasures, and Advances in, Information Science Reference, pp.158-180, 2012. ,
Privacy Management for Global Organisations. Data Privacy Management and Autonomous Spontaneous Security, LNCS, vol.5939, pp.9-17, 2010. ,
DOI : 10.1007/978-3-642-11207-2_2
Analysis of Privacy Impact Assessments within Major jurisdictions, 2010 Eighth International Conference on Privacy, Security and Trust, 2010. ,
DOI : 10.1109/PST.2010.5593260
Privacy Impact Assessments for Cloud Computing . Privacy and Security for Cloud Computing, Computer Communications and Networks, 2012. ,
Decision Support for Selection of Cloud Service Providers, GTSF, 2010. ,
Privacy Compliance Checking using a Model-Based Approach. E- Business Applications for Product Development and Competitive Growth: Emerging Technologies, Business Science Reference, IGI Global, pp.199-220, 2011. ,
DOI : 10.4018/9781609601324.ch010
Towards Achieving Accountability, Auditability and Trust in Cloud Computing, ACC 2011, Part IV, CCIS 193, pp.432-444, 2011. ,
DOI : 10.1145/1773912.1773926
Enhancing Privacy in Cloud Computing via Policybased Obfuscation, Journal of Supercomputing, 2010. ,
DOI : 10.1007/s11227-010-0425-z
Sticky Policies: An Approach for Managing Privacy across Multiple Parties, Computer, vol.44, issue.9, pp.60-68, 2011. ,
DOI : 10.1109/MC.2011.225
Securing Information Transfer in Distributed Computing Environments, IEEE Security & Privacy Magazine, vol.6, issue.1, pp.34-42, 2008. ,
DOI : 10.1109/MSP.2008.19