References

  1. A. Avizienis, J.-C. Laprie, B. Randell & C. Landwehr (2004): Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing 1(1), pp. 11–33, doi:10.1109/TDSC.2004.2.
  2. AXELOS (2016): ITIL | AXELOS. Available at https://www.axelos.com/best-practice-solutions/itil.
  3. Philip Dawid (2000): Causality Without Counterfactuals (With Discussion). J. Amer. Statist. Assoc 95, doi:10.1080/01621459.2000.10474210.
  4. Gregor Gössler & Lăcrămioara Aştefănoaei (2014): Blaming in Component-based Real-time Systems. In: Proceedings of the 14th International Conference on Embedded Software. ACM, pp. 7:1–7:10, doi:10.1145/2656045.2656048.
  5. Gregor Gössler & Daniel Le Métayer (2014): A general trace-based framework of logical causality. In: Formal Aspects of Component Software. Springer International Publishing, pp. 157–173, doi:10.1007/978-3-319-07602-7_11.
  6. Daniel Guagnin (2012): Managing privacy through accountability. Palgrave Macmillan, doi:10.1057/9781137032225.
  7. Joseph Y. Halpern (2015): A Modification of the Halpern-Pearl Definition of Causality. Proceedings of the 24th International Joint Conference on Artificial Intelligence, pp. 3022–3033. Available at http://arxiv.org/pdf/1505.00162.
  8. Joseph Y. Halpern & Judea Pearl (2005): Causes and Explanations: A Structural-Model Approach. Part I: Causes. The British Journal for the Philosophy of Science 56(4), pp. 843–887, doi:10.1093/bjps/axi147.
  9. Joseph Y. Halpern & Judea Pearl (2005): Causes and Explanations: A Structural-Model Approach. Part II: Explanations. The British Journal for the Philosophy of Science 56(4), pp. 889–911, doi:10.1093/bjps/axi148.
  10. ISACA (2016): COBIT 5: A Business Framework for the Governance and Management of Enterprise IT. Available at http://www.isaca.org/COBIT/Pages/default.aspx.
  11. Ralf Küsters, Tomasz Truderung & Andreas Vogt (2010): Accountability: Definition and Relationship to Verifiability. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM, New York, NY, USA, pp. 526–535, doi:10.1145/1866307.1866366.
  12. Nick Papanikolaou & Siani Pearson (2013): A Cross-Disciplinary Review of the Concept of Accountability A Survey of the Literature.
  13. Judea Pearl (2009): Causality: Models, Reasoning and Inference, 2nd edition. Cambridge University Press, doi:10.1017/CBO9780511803161.
  14. Siani Pearson & Andrew Charlesworth (2009): Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings, chapter Accountability as a Way Forward for Privacy Protection in the Cloud. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 131–144. Available at http://dx.doi.org/10.1007/978-3-642-10665-1_12.
  15. U.S. Department of Health & Human Services (2016): Health Information Privacy | HHS.gov. Available at http://www.hhs.gov/hipaa/.
  16. Daniel J. Weitzner, Harold Abelson, Tim Berners-Lee, Joan Feigenbaum, James Hendler & Gerald Jay Sussman (2008): Information Accountability. Commun. ACM 51(6), pp. 82–87, doi:10.1145/1349026.1349043.
  17. Zhifeng Xiao, Nandhakumar Kathiresshan & Yang Xiao (2012): A survey of accountability in computer networks and distributed systems. Security and Communication Networks, doi:10.1002/sec.574.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org