A survey of personal privacy protection in public service mashups
暂无分享,去创建一个
[1] Hal G. Gueutal,et al. A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .
[2] Jason Hong,et al. What do we , 2008, WEUSE@ICSE.
[3] France Bélanger,et al. A framework for e-government: privacy implications , 2006, Bus. Process. Manag. J..
[4] Scott R. Klemmer,et al. Hacking, Mashing, Gluing: Understanding Opportunistic Design , 2008, IEEE Pervasive Computing.
[5] Lorrie Faith Cranor,et al. Internet privacy , 1999, CACM.
[6] Benjamin C. M. Fung,et al. Privacy-preserving data mashup , 2009, EDBT '09.
[7] Christoph Treude,et al. Mashup environments in software engineering , 2010, Web2SE '10.
[8] Katarina Stanoevska-Slabeva,et al. Design Principles of Enterprise Mashups , 2009, Wissensmanagement.
[9] Starr Roxanne Hiltz,et al. Seven privacy worries in ubiquitous social computing , 2007, SOUPS '07.
[10] Lorrie Faith Cranor,et al. P3P: Making Privacy Policies More Useful , 2003, IEEE Secur. Priv..
[11] Neeli R. Prasad,et al. Context-aware privacy protection with profile management , 2006, WMASH '06.
[12] Keith C. Clarke,et al. Interactive Visual Exploration of a Large Spatio-temporal Dataset: Reflections on a Geovisualization Mashup. , 2007, IEEE Transactions on Visualization and Computer Graphics.
[13] Samuel Greengard,et al. Following the crowd , 2011, Commun. ACM.
[14] Steven Russell,et al. The rise and fall of government - community partnerships for urban development: grassroots testimony from Colombo , 2000 .
[15] Katie Shilton,et al. Four billion little brothers? , 2009, Commun. ACM.
[16] Mary Beth Rosson,et al. What’s in a mashup? And why? Studying the perceptions of web-active end users , 2008, 2008 IEEE Symposium on Visual Languages and Human-Centric Computing.
[17] Halit Oguztüzün,et al. Legacy Migration to Service-Oriented Computing with Mashups , 2007, International Conference on Software Engineering Advances (ICSEA 2007).
[18] Wolfgang Ketter,et al. Introducing an Agile Method for Enterprise Mash-Up Component Development , 2009, 2009 IEEE Conference on Commerce and Enterprise Computing.
[19] H. Jeff Smith,et al. Values, personal information privacy, and regulatory approaches , 1995, CACM.
[20] Chang-Chun Tsai,et al. The web 2.0 movement: mashups driven and web services , 2009 .
[21] Vlad Trifa,et al. Towards physical mashups in the Web of Things , 2009, 2009 Sixth International Conference on Networked Sensing Systems (INSS).
[22] Fatos Xhafa,et al. Crowd-Sourcing and Data Mashups Challenges: A Mini Case Study for Assisting and Solving a Disaster Management Scenario , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.
[23] P. Alcock. Building the Big Society: a new policy environment for the third sector in England , 2010 .
[24] Fabio Casati,et al. Understanding Mashup Development , 2008, IEEE Internet Computing.
[25] A.S. Voulodimos,et al. Using Personalized Mashups for Mobile Location Based Services , 2008, 2008 International Wireless Communications and Mobile Computing Conference.
[26] Rüdiger Grimm,et al. Can P3P help to protect privacy worldwide? , 2000, MULTIMEDIA '00.
[27] Peter F. Patel-Schneider,et al. Enabling context-aware and privacy-conscious user data sharing , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.
[28] Denilson Barbosa,et al. Database and XML Technologies , 2010, Lecture Notes in Computer Science.
[29] Katarina Stanoevska-Slabeva,et al. Enterprise Mashups: Design Principles towards the Long Tail of User Needs , 2008, 2008 IEEE International Conference on Services Computing.
[30] Suh-Yin Lee,et al. Recent Advances in Visual Information Systems , 2002, Lecture Notes in Computer Science.
[31] Jan Camenisch,et al. Information privacy?! , 2012, Comput. Networks.
[32] P. Clutterbuck,et al. Attitudes towards information privacy , 2001 .
[33] A Min Tjoa,et al. Privacy Aspects of Mashup Architecture , 2010, 2010 IEEE Second International Conference on Social Computing.
[34] Brian Detlor,et al. Towards a Framework for Government Portal Design: The Government, Citizen and Portal Perspectives , 2002 .
[35] David Clark,et al. Open government in Britain: Discourse and practice , 1996 .
[36] Soon Ae Chun,et al. Privacy protection in government mashups , 2009, Inf. Polity.
[37] France Bélanger,et al. The utilization of e‐government services: citizen trust, innovation and acceptance factors * , 2005, Inf. Syst. J..
[38] Deqing Zou,et al. A Hidden Credential Based Oblivious Automated Trust Negotiation Model , 2007 .
[39] Thomas Santen,et al. Eliciting confidentiality requirements in practice , 2005, CASCON.
[40] Bettina Berendt,et al. Ubiquitous Social Networks: Opportunities and Challenges for Privacy-Aware User Modelling , 2007 .
[41] R. Adams. Proceedings , 1947 .
[42] Andreas Thor,et al. Dynamic Fusion of Web Data , 2007, XSym.
[43] Helen Nissenbaum,et al. Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).