Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
暂无分享,去创建一个
[1] David R. Kuhn,et al. Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .
[2] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[3] Gregory D. Abowd,et al. Securing context-aware applications using environment roles , 2001, SACMAT '01.
[4] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[5] Philip E. Agre,et al. Changing Places: Contexts of Awareness in Computing , 2001, Hum. Comput. Interact..
[6] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[7] David J. Danelski,et al. Privacy and Freedom , 1968 .
[8] Ivar E. Berg,et al. Education and Jobs: The Great Training Robbery , 1971 .
[9] Ravi S. Sandhu,et al. Engineering authority and trust in cyberspace: the OM-AM and RBAC way , 2000, RBAC '00.
[10] James A. Landay,et al. Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..
[11] J. Meade,et al. External Economies and Diseconomies in a Competitive Situation , 1952 .
[12] Pamela Samuelson,et al. Privacy as intellectual property , 2000 .
[13] D. Richard Kuhn,et al. Role-Based Access Control ( RBAC ) : Features and Motivations , 2014 .
[14] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[15] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[16] J. Horrigan,et al. Trust and privacy online: Why Americans want to rewrite the rules , 2000 .
[17] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[18] Mark Weiser,et al. Some Computer Science Problems in Ubiquitous Computing , 1993 .
[19] Nelson Minar,et al. Wearable computing meets ubiquitous computing: reaping the best of both worlds , 1999, Digest of Papers. Third International Symposium on Wearable Computers.
[20] Joachim Biskup,et al. Threshold-based identity recovery for privacy enhanced applications , 2000, CCS.
[21] George A. Akerlof. The Market for “Lemons”: Quality Uncertainty and the Market Mechanism , 1970 .
[22] Kenneth C. Laudon,et al. Extensions to the Theory of Markets and Privacy: Mechanics of Pricing Information , 1997 .
[23] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[24] Jonathan Grudin,et al. Desituating Action: Digital Representation of Context , 2001, Hum. Comput. Interact..
[25] David Brin,et al. The Transparent Society , 1998 .
[26] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .