Trust, Privacy, and Security in Digital Business
暂无分享,去创建一个
[1] P. Hoffman. Internet Draft , 1998 .
[2] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[3] Michael K. Reiter,et al. Anonymous Web transactions with Crowds , 1999, CACM.
[4] Terry Winograd,et al. Understanding computers and cognition , 1986 .
[5] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[6] Diomidis Spinellis,et al. User Requirements of Trusted Third Parties in Europe , 1999 .
[7] Günther Pernul,et al. Trust for Electronic Commerce Transactions , 1999, ADBIS.
[8] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[9] Rolf Oppliger,et al. Authentication and authorization infrastructures (AAIs): a comparative survey , 2004, Comput. Secur..
[10] Tharam S. Dillon,et al. Managing the dynamic nature of trust , 2004 .
[11] Ildemaro Araujo. Privacy mechanisms supporting the building of trust in e-commerce , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).
[12] E. Turban,et al. Electronic Commerce: A Managerial Perspective , 1999 .
[13] John Paynter,et al. Privacy issues on the Internet , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[14] Joobin Choobineh,et al. Trust in electronic commerce: definition and theoretical considerations , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[15] Mark R. Brown,et al. Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior , 2004, J. Electron. Commer. Res..
[16] Stefanos Gritzalis,et al. Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture , 2000, Comput. Secur..
[17] Roger Clarke,et al. Internet privacy concerns confirm the case for intervention , 1999, CACM.
[18] Rachel Burnett. Legal aspects of e-commerce , 2000 .
[19] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.