UI prototypes : Policy administration and presentation (version 1)
暂无分享,去创建一个
[1] Sabrina De Capitani di Vimercati,et al. Expressive and Deployable Access Control in Open Web Service Applications , 2011, IEEE Transactions on Services Computing.
[2] Siani Pearson,et al. How ordinary internet users can have a chance to influence privacy policies , 2006, NordiCHI '06.
[4] Sabrina De Capitani di Vimercati,et al. Enabling Privacy-preserving Credential-based Access Control with XACML and SAML , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[5] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[6] Marcus Helfrich,et al. EG Datenschutzrichtlinie : Kurzkommentar , 1999 .
[7] Clare-Marie Karat,et al. Evaluating interfaces for privacy policy rule authoring , 2006, CHI.
[8] Janice Y. Tsai,et al. 1 Symbols of Privacy , 2006 .
[9] John Sören Pettersson,et al. Making PRIME usable , 2005, SOUPS '05.
[10] Gregory Neven,et al. Downstream Usage Control , 2010, POLICY.
[11] M. Rundle. International Personal Data Protection and Digital Identity Management Tools , 2006 .
[12] Wolfgang Däubler. Bundesdatenschutzgesetz : Kompaktkommentar zum BDSG , 2010 .
[13] Lorrie Faith Cranor,et al. User interfaces for privacy agents , 2006, TCHI.
[14] Pierangela Samarati,et al. Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project , 2010, J. Comput. Secur..
[15] John Karat,et al. Privacy in information technology: Designing to enable privacy policy management in organizations , 2005, Int. J. Hum. Comput. Stud..
[16] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[18] John Sören Pettersson. HCI guidance and proposals , 2005 .
[19] Clare-Marie Karat,et al. An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench , 2006, SOUPS '06.
[20] Sebastian Mödersheim,et al. A card requirements language enabling privacy-preserving access control , 2010, SACMAT '10.
[21] Almut Herzog,et al. Linköping Studies in Science and Technology Usable Security Policies for Runtime Environments , 2022 .
[22] Lorrie Faith Cranor,et al. A "nutrition label" for privacy , 2009, SOUPS.
[23] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .