Uncertain Privacy Decision about Access Personal Information in Pervasive Computing Environments
暂无分享,去创建一个
Jizhong Zhao | Yong Qi | Di Hou | Qingsheng Zhang | Huawei Han | Yong Qi | Jizhong Zhao | Di Hou | Qingsheng Zhang | Huawei Han
[1] Gregory D. Abowd,et al. Providing architectural support for building context-aware applications , 2000 .
[2] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[3] James A. Landay,et al. Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..
[4] Elin Rønby Pedersen. Calls.calm: enabling caller and callee to collaborate , 2001, CHI Extended Abstracts.
[5] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[6] David Garlan,et al. Project Aura: Toward Distraction-Free Pervasive Computing , 2002, IEEE Pervasive Comput..
[7] Mustaque Ahamad,et al. Generalized role-based access control , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[8] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[9] Andrzej Skowron,et al. Rough Sets: A Tutorial , 1998 .
[10] Mustaque Ahamad,et al. A context-aware security architecture for emerging applications , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[11] René W. Wagenaar,et al. A fuzzy logic based approach to support users self-control of their private contextual data retrieval , 2004, ECIS.