Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications
暂无分享,去创建一个
Pasi Ahonen | Michael Friedewald | Petteri Alahuhta | Elena Vildjiounaite | David Wright | M. Friedewald | David Wright | P. Alahuhta | P. Ahonen | Elena Vildjiounaite
[1] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[2] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[3] Hartmut Pohl,et al. RFID security , 2004, Inf. Secur. Tech. Rep..
[4] Lorrie Faith Cranor,et al. P3P: Making Privacy Policies More Useful , 2003, IEEE Secur. Priv..
[5] Michael Friedewald,et al. Privacy, identity and security in ambient intelligence: A scenario analysis , 2007, Telematics Informatics.
[6] Michael Rohs,et al. Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing , 2005, Ambient Intelligence.
[7] A. Fleming Seay,et al. A System for Finding Frequently Lost Objects in the Home , 1999 .
[8] James A. Landay,et al. Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.
[9] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[10] Gordon Bell,et al. Passive capture and ensuing issues for a personal lifetime store , 2004, CARPE'04.
[11] Christine L. Lisetti,et al. Emotion Recognition from Physiological Signals for User Modeling of Affect , 2003 .
[12] Sang Hyun Park,et al. Gate reminder: a design case of a smart reminder , 2004, DIS '04.