PETs and their users: a critical review of the potentials and limitations of the privacy as confidentiality paradigm
暂无分享,去创建一个
[1] Elizabeth D. Mynatt,et al. Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .
[2] Josep Domingo-Ferrer,et al. A Critique of k-Anonymity and Some of Its Enhancements , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[3] W. Orlikowski. Sociomaterial Practices: Exploring Technology at Work , 2007 .
[4] Antoinette Rouvroy,et al. Technology, Virtuality and Utopia. , 2009 .
[5] J. D. Babcock. A brief description of privacy measures in the RUSH time-sharing system , 1967, AFIPS '67 (Spring).
[6] Sandra Braman,et al. Tactical memory: The politics of openness in the construction of memory , 2006, First Monday.
[7] Cornelius E. Gallagher,et al. The computer and the invasion of privacy , 1967, SIGCPR '67.
[8] S. Graham. Software-sorted geographies , 2005 .
[9] Lise Getoor,et al. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles , 2009, WWW '09.
[10] Herman T. Tavani,et al. Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.
[11] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[12] D. Zwick,et al. Whose Identity Is It Anyway? Consumer Representation in the Age of Database Marketing , 2004 .
[13] Vitaly Shmatikov,et al. Myths and fallacies of "Personally Identifiable Information" , 2010, Commun. ACM.
[14] Willis H. Ware,et al. Security and privacy: similarities and differences , 1967, AFIPS '67 (Spring).
[15] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[16] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[17] M. Angela Sasse,et al. Not seeing the crime for the cameras? , 2010, Commun. ACM.
[18] Serge Gutwirth,et al. Privacy and the Information Age , 2001 .
[19] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[20] Jack Rosenberger. CS and technology leaders honored , 2010, Commun. ACM.
[21] Nick Mathewson,et al. Reputation in privacy enhancing technologies , 2002, CFP '02.
[22] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[23] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[24] Benjamin Fabian,et al. Emerging Markets for RFID Traces , 2006, ArXiv.
[25] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[26] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[27] H. E. Petersen,et al. System implications of information privacy , 1899, AFIPS '67 (Spring).
[28] Nicola Zannone,et al. Towards the development of privacy-aware systems , 2009, Inf. Softw. Technol..
[29] Stuart Reeves,et al. Facebook as a political weapon: Information in social networks , 2009 .
[30] James A. Landay,et al. Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.
[31] Raj Sharman,et al. Handbook of Research on Social and Organizational Liabilities in Information Security , 2008 .
[32] David Lyon,et al. Surveillance Studies: understanding visibility, mobility and the phenetic fix. , 2002 .
[33] Edward L. Glaser,et al. A brief description of privacy measures in the multics operating system , 1967, AFIPS '67 (Spring).
[34] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[35] Willis H. Ware,et al. Security and privacy in computer systems , 1899, AFIPS '67 (Spring).
[36] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[37] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[38] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[39] David Lyon,et al. Surveillance as Social Sorting : Privacy, Risk and Automated Discrimination , 2005 .
[40] Josep Domingo-Ferrer,et al. From t-Closeness to PRAM and Noise Addition Via Information Theory , 2008, Privacy in Statistical Databases.
[41] Hugo Liu,et al. Unraveling the Taste Fabric of Social Networks , 2006, Int. J. Semantic Web Inf. Syst..
[42] John E. McGrath,et al. Loving Big Brother: Performance, Privacy and Surveillance Space , 2004 .
[43] David J. Phillips. Privacy policy and PETs , 2001, New Media Soc..
[44] James P. Titus,et al. Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).
[45] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.