Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system
暂无分享,去创建一个
[1] Marianne Winslett,et al. Policy migration for sensitive credentials in trust negotiation , 2003, WPES '03.
[2] Jan Camenisch,et al. Design and implementation of the idemix anonymous credential system , 2002, CCS '02.
[3] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[4] James A. Landay,et al. Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..
[5] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[6] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[7] Lance Spitzner,et al. Honeypots: catching the insider threat , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[8] Robert Boguslaw,et al. Privacy and Freedom , 1968 .
[9] Pat Jefferies. Multimedia, cyberspace and ethics , 2000, 2000 IEEE Conference on Information Visualization. An International Conference on Computer Visualization and Graphics.
[10] Joan Feigenbaum,et al. Privacy Engineering for Digital Rights Management Systems , 2001, Digital Rights Management Workshop.
[11] Michael D. Smith,et al. Protecting Personal Information: Obstacles and Directions , 2005, WEIS.
[12] Pat Jefferies. Multimedia, Cyberspace & Ethics , 2000 .
[13] P. Clutterbuck,et al. Attitudes towards information privacy , 2001 .
[14] Grady N. Drew. Using Set for Secure Electronic Commerce , 1998 .
[15] Christian Damsgaard Jensen,et al. Trading Privacy for Trust , 2004, iTrust.