A Study on Context-aware Privacy Protection for Personal Information
暂无分享,去创建一个
Jizhong Zhao | Yong Qi | Liang Liu | Di Hou | Tianhai Zhao | Qingsheng Zhang | Yong Qi | Jizhong Zhao | Di Hou | Liang Liu | Qingsheng Zhang | Tianhai Zhao
[1] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[2] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[3] James A. Landay,et al. Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..
[4] René W. Wagenaar,et al. Towards users driven privacy control , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[5] Mustaque Ahamad,et al. A context-aware security architecture for emerging applications , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[6] Elin Rønby Pedersen. Calls.calm: enabling caller and callee to collaborate , 2001, CHI Extended Abstracts.
[7] Mustaque Ahamad,et al. Generalized role-based access control , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[8] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[9] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[10] Jadwiga Indulska,et al. Extending context models for privacy in pervasive computing environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[11] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[12] Anind K. Dey,et al. Managing Personal Information Disclosure in Ubiquitous Computing Environments , 2003 .
[13] ConsolvoSunny,et al. Using the Experience Sampling Method to Evaluate Ubicomp Applications , 2003 .
[14] Ashraf Khalil,et al. Context-aware telephony: privacy preferences and sharing patterns , 2006, CSCW '06.