Privacy challenges in ambient intelligent systems: A critical discussion.
暂无分享,去创建一个
[1] Gerhard Steinke,et al. Data privacy approaches from US and EU perspectives , 2002, Telematics Informatics.
[2] Stefanos Gritzalis,et al. Enhancing Web privacy and anonymity in the digital era , 2004, Inf. Manag. Comput. Secur..
[3] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[4] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[5] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[6] Jun Pang,et al. Bulletin Boards in Voting Systems: Modelling and Measuring Privacy , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[7] David J. Danelski,et al. Privacy and Freedom , 1968 .
[8] Alfred Kobsa,et al. Privacy-enhancing technologies , 2008 .
[9] Yves Demazeau,et al. Representing privacy regulations with deontico-temporal operators , 2011, Web Intell. Agent Syst..
[10] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[11] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[12] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[13] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[14] Grigoris Antoniou,et al. DEAL: A Distributed Authorization Language for Ambient Intelligence , 2011, Int. J. Ambient Comput. Intell..
[15] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[16] Lars Kulik,et al. Location privacy and location-aware computing , 2006 .
[17] J. W. DeCew. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .
[18] Leon van der Torre,et al. Convivial Ambient Technologies: Requirements, Ontology and Design , 2010, Comput. J..
[19] Diane J. Cook,et al. Author's Personal Copy Pervasive and Mobile Computing Ambient Intelligence: Technologies, Applications, and Opportunities , 2022 .
[20] Günter Karjoth,et al. A privacy policy model for enterprises , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[21] Philip Brey,et al. Freedom and Privacy in Ambient Intelligence , 2005, Ethics and Information Technology.
[22] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[23] A. Moore. Privacy: Its Meaning and Value , 2003 .
[24] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[25] Timothy W. Finin,et al. Preserving Privacy in Context-Aware Systems , 2011, 2011 IEEE Fifth International Conference on Semantic Computing.
[26] Piero A. Bonatti,et al. Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security , 2008, ICLP.
[27] Eric Horvitz,et al. Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.
[28] Min Y. Mun,et al. Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing , 2009 .
[29] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[30] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[31] Jong Hyuk Park,et al. Privacy and fair information practices in ubiquitous environments: Research challenges and future directions , 2009, Internet Res..
[32] Guido Boella,et al. Privacy Policies with Modal Logic: The Dynamic Turn , 2010, DEON.
[33] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[34] Marc Langheinrich,et al. Towards a New Privacy-Aware Location Sharing Platform , 2011, J. Internet Serv. Inf. Secur..
[35] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[36] Michael Friedewald,et al. Privacy, trust and policy-making: Challenges and responses , 2009, Comput. Law Secur. Rev..
[37] Thomas M. Cooley,et al. A treatise on the law of torts, or, The wrongs which arise independent of contract. , 1993 .
[38] Nicolas Christin,et al. Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[39] Guido Boella,et al. The Coprelobri project: the logical approach to privacy , 2011 .
[40] Max I. Kanovich,et al. Collaborative Planning with Confidentiality , 2011, Journal of Automated Reasoning.