Safeguarding Personal Data Using Trusted Computing in Pervasive Computing
暂无分享,去创建一个
[1] Vlad C. Coroamă,et al. Geduldige Technologie für ungeduldige Patienten: Führt Ubiquitous Computing zu mehr Selbstbestimmung? , 2003 .
[2] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[3] Laurent Bussard,et al. Trust and Authorization in Pervasive B2E Scenarios , 2003, ISC.
[4] Ulrich Kohl,et al. From Social Requirements to Technical Solutions - Bridging the Gap with User-Oriented Data Security , 1995 .
[5] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[6] Siani Pearson,et al. Towards accountable management of identity and privacy: sticky policies and enforceable tracing services , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[7] Mark Weiser. The computer for the 21st century , 1991 .
[8] Larry Korba,et al. Towards Meeting the Privacy Challenge: Adapting DRM , 2002, Digital Rights Management Workshop.
[9] Siani Pearson,et al. Towards Accountable Management of Privacy and Identity Information , 2003, ESORICS.
[10] Michael Kreutzer,et al. Mobile Identity Management , 2002 .
[11] Klaus-Peter Löhr,et al. Entwicklung und Verwaltung von Zugriffsschutz in verteilten Objektsystemen – eine Krankenhausfallstudie , 2003, PIK Prax. Informationsverarbeitung Kommun..
[12] R. W. Peterson,et al. OPTICAL INTERFEROMETRY OF SURFACES , 1991 .