1. EU Cybersecurity plan to protect open internet and online freedom and opportunity—cyber security strategy and proposal for a directive.
http://ec.europa.eu/digital-agenda/en/news/eu-cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security
(February 2013).
http://ec.europa.eu/digital-agenda/en/news/eu-cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security
2. Aaber, Z.S., Crowder, R.M., Fadhel, N.F., Wills, G.B.: Preventing document leakage through active document. In: 2014 World Congress on Internet Security (WorldCIS), pp. 53–58 (Dec 2014)
3. Backes, M., Gerling, S., Lorenz, S., Lukas, S.: X-pire 2.0: A user-controlled expiration date and copy protection mechanism. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, pp. 1633–1640. SAC ’14, ACM, New York, NY, USA (2014). doi:
http://doi.acm.org/10.1145/2554850.2554856
4. Backes, M., Maffei, M., Pecina, K.: Automated synthesis of privacy-preserving distributed applications. In: Proceedings of ISOC NDSS (2012).
http://www.lbs.cs.uni-saarland.de/publications/asosda-long.pdf
5. Balsa, E., Brandimarte, L., Acquisti, A., Diaz, C., Gurses, S.: Spiny CACTOS: OSN users attitudes and perceptions towards cryptographic access control tools. In: Proceedings 2014 Workshop on Usable Security (2014).
https://www.internetsociety.org/doc/spiny-cactos-osn-users-attitudes-and-perceptions-towards-cryptographic-access-control-tools