Item does not contain fulltextEuroPLoP '18: 23rd European Conference on Pattern Languages of Programs, Irsee, Germany — July 04 - 08, 201
Item does not contain fulltextSymposium 'Nederlands-Afrikaanstalig Genootschap voor Wijsbegeerte, 22...
Contains fulltext : 92128.pdf (author's version ) (Closed access)WPES 2011, Worksh...
Item does not contain fulltextRELAY project workshop, Maastricht University, 17 juni 202
Contains fulltext : 191709.pdf (publisher's version ) (Open Access
Item does not contain fulltextBusiness applications often use such data structures as Presence Patte...
This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table...
Part 1: ConferenceInternational audiencePrivacy requirements are difficult to elicit for any given s...
Item does not contain fulltextSPW 2016 : 2016 IEEE Symposium on Security and Privacy Workshops, 23 m...
Privacy, isolation, and fairness are important issues for virtual commu-nities and collaborative app...
Fulfilling the legal requirements of mandated disclosure is a challenge in many contexts. Privacy co...
A proper security architecture is an essential part of implementing robust and reliable networked ap...
Item does not contain fulltextBespreking van: M. van de Merwe,Zorg voor privacy Utrecht:Privacylab ,...
Masteroppgave i informasjons- og kommunikasjonsteknologi 2002 - Høgskolen i Agder, GrimstadThe growi...
ABSTRACT1 A proper security architecture is an essential part of implementing robust and reliable ne...
A privacy pattern catalog provides guidance with respect to data protection requirements, to both te...
Item does not contain fulltextSymposium 'Nederlands-Afrikaanstalig Genootschap voor Wijsbegeerte, 22...
Contains fulltext : 92128.pdf (author's version ) (Closed access)WPES 2011, Worksh...
Item does not contain fulltextRELAY project workshop, Maastricht University, 17 juni 202
Contains fulltext : 191709.pdf (publisher's version ) (Open Access
Item does not contain fulltextBusiness applications often use such data structures as Presence Patte...
This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table...
Part 1: ConferenceInternational audiencePrivacy requirements are difficult to elicit for any given s...
Item does not contain fulltextSPW 2016 : 2016 IEEE Symposium on Security and Privacy Workshops, 23 m...
Privacy, isolation, and fairness are important issues for virtual commu-nities and collaborative app...
Fulfilling the legal requirements of mandated disclosure is a challenge in many contexts. Privacy co...
A proper security architecture is an essential part of implementing robust and reliable networked ap...
Item does not contain fulltextBespreking van: M. van de Merwe,Zorg voor privacy Utrecht:Privacylab ,...
Masteroppgave i informasjons- og kommunikasjonsteknologi 2002 - Høgskolen i Agder, GrimstadThe growi...
ABSTRACT1 A proper security architecture is an essential part of implementing robust and reliable ne...
A privacy pattern catalog provides guidance with respect to data protection requirements, to both te...
Item does not contain fulltextSymposium 'Nederlands-Afrikaanstalig Genootschap voor Wijsbegeerte, 22...
Contains fulltext : 92128.pdf (author's version ) (Closed access)WPES 2011, Worksh...
Item does not contain fulltextRELAY project workshop, Maastricht University, 17 juni 202