Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps
暂无分享,去创建一个
[1] Kai Rannenberg,et al. Privacy and Identity Management for Life , 2011, Privacy and Identity Management for Life.
[2] E. Friedman,et al. The Social Cost of Cheap Pseudonyms , 2001 .
[3] K. Hausken. Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[4] Bart De Decker,et al. Communications and Multimedia Security , 2013, Lecture Notes in Computer Science.
[5] Spyros Kokolakis,et al. An Analysis of Privacy-Related Strategic Choices of Buyers and Sellers in E-commerce Transactions , 2012, 2012 16th Panhellenic Conference on Informatics.
[6] Lisa Rajbhandari,et al. Mapping between Classical Risk Management and Game Theoretical Approaches , 2011, Communications and Multimedia Security.
[7] Rajkumar Buyya,et al. CloudSim: A Novel Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services , 2009, ArXiv.
[8] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[9] Lisa Rajbhandari,et al. Using Game Theory to Analyze Risk to Privacy: An Initial Insight , 2010, PrimeLife.
[10] T. S. Raghu,et al. Privacy and Security Practices in the Arena of Cloud Computing - A Research in Progress , 2010, AMCIS.
[11] Helmut Krcmar,et al. Competing in the Clouds: A Strategic Challenge for ITSP Ltd , 2010, Commun. Assoc. Inf. Syst..