Accountability in internet transactions revisited
暂无分享,去创建一个
[1] Yan Wang,et al. A Disclosure Framework for Service Accountability in SOA , 2008, 2008 IEEE International Conference on e-Business Engineering.
[2] Jianying Zhou,et al. An intensive survey of fair non-repudiation protocols , 2002, Comput. Commun..
[3] M. Bovens. Two Concepts of Accountability: Accountability as a Virtue and as a Mechanism , 2010 .
[4] John D. Dilulio. Principled Agents: The Cultural Bases of Behavior in a Federal Government Bureaucracy , 1994 .
[5] Yan Wang,et al. Accountability Computing for E-society , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[6] He Dake,et al. Accountability of Perfect Concurrent Signature , 2008, 2008 International Conference on Computer and Electrical Engineering.
[7] Deqing Zou,et al. A Hidden Credential Based Oblivious Automated Trust Negotiation Model , 2007 .
[8] N. Asokan,et al. Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.
[9] Robert S. Gilmour,et al. Rediscovering Principles of Public Administration: The Neglected Foundation of Public Law. , 1995 .
[10] Larry Diamond,et al. The Self Restraining State: Power and Accountability in New Democracies , 1999 .
[11] Bo Meng,et al. The practical detailed requirements of accountability and its application in the electronic payment protocols , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.
[12] Maureen V Iacono. The culture of accountability. , 2013, Journal of perianesthesia nursing : official journal of the American Society of PeriAnesthesia Nurses.
[13] Yi Mu,et al. Perfect Concurrent Signature Schemes , 2004, ICICS.
[14] Heike Neumann,et al. A Sound Logic for Analysing Electronic Commerce Protocols , 1998, ESORICS.
[15] Bala Srinivasan,et al. Lightweight Mobile Credit-Card Payment Protocol , 2003, INDOCRYPT.
[16] Daisuke Mashima,et al. Enhancing accountability of electronic health record usage via patient-centric monitoring , 2012, IHI '12.
[17] S. Khadka. Privacy, security and storage issues in medical data management , 2012, 2012 Third Asian Himalayas International Conference on Internet.
[18] Jerome B. McKinney. Process Accountability and the Creative Use of Intergovernmental Resources , 1981 .
[19] Jianying Zhou,et al. The Fairness of Perfect Concurrent Signatures , 2006, ICICS.
[20] Jonathan G. S. Koppell. Pathologies of Accountability: ICANN and the Challenge of “Multiple Accountabilities Disorder” , 2005 .
[21] A. Liviga. Professionalism and bureaucratic responsiveness conflict or compatibility , 1992 .
[22] Gordon Tullock,et al. The Politics of Bureaucracy. , 1966 .
[23] Massimo Durante,et al. How to cross boundaries in the information society: vulnerability, responsiveness, and accountability , 2013, CSOC.
[24] Christopher J. Pavlovski,et al. Towards Accountable Enterprise Mashup Services , 2007 .
[25] Supakorn Kungpisdan,et al. Practical Reasoning about Accountability in Electronic Commerce Protocols , 2001, ICISC.
[26] Bala Srinivasan,et al. Accountability logic for mobile payment protocols , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[27] Arti Trivedi,et al. A Study of Literature Review on Individual Accountability , 2013 .
[28] Ana Ferreira,et al. Towards accountability for Electronic Patient Records , 2003, 16th IEEE Symposium Computer-Based Medical Systems, 2003. Proceedings..
[29] Kenneth G. Paterson,et al. Concurrent Signatures , 2004, EUROCRYPT.
[30] Renato Iannella,et al. Privacy by information accountability for e-health systems , 2011, 2011 6th International Conference on Industrial and Information Systems.
[31] Richard Kearney,et al. Professionalism and Bureaucratic Responsiveness: Conflict or Compatibility? , 1988 .