Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles
暂无分享,去创建一个
[1] Max Mühlhäuser,et al. Multilaterally Secure Ubiquitous Auditing , 2010, Intelligent Networking, Collaborative Systems and Applications.
[2] Nalini Venkatasubramanian,et al. On-Demand Information Portals for Disaster Situations , 2007, 2007 IEEE Intelligence and Security Informatics.
[3] Antonio Kung,et al. Privacy Verification Using Ontologies , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[4] Gustas Remigijus,et al. Pragmatic-Driven Approach for Service-Oriented Analysis and Design , 2008 .
[5] Felix Flentge,et al. Designing Context-Aware HCI for Collaborative Emergency Management , 2008 .
[6] Apostolos P. Fournaris. Trust Ensuring Crisis Management Hardware Module , 2010, Inf. Secur. J. A Glob. Perspect..
[7] Prima Gustiené. Development of a new service-oriented modelling method for information systems analysis and design , 2010 .
[8] James A. Landay,et al. Siren: Context-aware Computing for Firefighting , 2004, Pervasive.
[9] B. W. Murgatroyd. End to end encryption in public safety TETRA networks , 2003 .
[10] Alexander V. Smirnov,et al. Ubiquitous Computing for Personalized Decision Support in Emergency , 2011, Int. J. Inf. Syst. Crisis Response Manag..
[11] H. Raghav Rao,et al. Framework for Analyzing Critical Incident Management Systems (CIMS) , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[12] David J. Phillips. Beyond Privacy: Confronting Locational Surveillance in Wireless Communication , 2003 .
[13] Murray E. Jennex,et al. Emergency Response Systems: The Utility Y2k Experience , 2004 .
[14] Andreas Haeberlen,et al. CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable , 2009, NDSS.
[15] Xiang Yao,et al. The Design of a Dynamic Emergency Response Management Information System (DERMIS) , 2004 .
[16] Prima Gustiené,et al. How Models and Methods for Analysis and Design of Information Systems can be Improved to Better Support Communication and Learning , 2010 .
[17] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[18] Max Mühlhäuser,et al. MundoMessage: enabling trustworthy ubiquitous emergency communication , 2011, ICUIMC '11.
[19] John A. Zachman,et al. Enterprise Architecture: The Issue of the Century , 2001 .
[20] Bashar Nuseibeh,et al. Requirements engineering: a roadmap , 2000, ICSE '00.
[21] Hui Xiong,et al. Secure information sharing and analysis for effective emergency management , 2008, DG.O.
[22] Achim D. Brucker,et al. Information Flow in Disaster Management Systems , 2010, 2010 International Conference on Availability, Reliability and Security.
[23] Nalini Venkatasubramanian,et al. Project rescue: challenges in responding to the unexpected , 2003, IS&T/SPIE Electronic Imaging.
[24] Johann Cas,et al. Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.
[25] Hermann Hellwagner,et al. Information and Communication Systems for Mobile Emergency Response , 2008, UNISCON.
[26] Jungwoo Ryoo,et al. A comparison and classification framework for disaster information management systems , 2006 .
[27] P. Ehlert. INTELLIGENT USER INTERFACES Introduction and survey , 2003 .
[28] Achim D. Brucker,et al. Attribute-Based Encryption with Break-Glass , 2010, WISTP.
[29] Stefan G. Weber. Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis , 2009, 2009 International Conference on Intelligent Networking and Collaborative Systems.
[30] Max Mühlhäuser,et al. Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[31] M. Turoff,et al. Session details: Emergency response information systems: emerging trends and technologies , 2007 .
[32] Jan L. G. Dietz,et al. Enterprise ontology - theory and methodology , 2006 .
[33] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[34] Stefan G. Weber,et al. Inherent Tradeoffs in Ubiquitous Computing Services , 2007, GI Jahrestagung.
[35] Costas Lambrinoudakis,et al. Protecting privacy and anonymity in pervasive computing: trends and perspectives , 2006, Telematics Informatics.
[36] Zhou Wang,et al. MIKoBOS - A Mobile Information and Communication System for Emergency Response , 2006 .
[37] Chris W. Johnson. Complexity, Structured Chaos and the Importance of Information Management for Mobile Computing in the UK Floods of 2007 , 2008, Mobile Response.
[38] Thomas Kirste,et al. Design Challenges for an Integrated Disaster Management Communication and Information System , 2002 .
[39] Carmela Troncoso,et al. Engineering Privacy by Design , 2011 .
[40] Remigijus Gustas,et al. Conceptual Modeling Method for Separation of Concerns and Integration of Structure and Behavior , 2012, Int. J. Inf. Syst. Model. Des..
[41] Christoph Endres,et al. A task-based messaging approach to facilitate staff work , 2010, ISCRAM.
[42] Marit Hansen,et al. Identity and Privacy Issues Throughout Life , 2011, Privacy and Identity Management for Life.
[43] Hans-Werner Gellersen,et al. Location and Navigation Support for Emergency Responders: A Survey , 2010, IEEE Pervasive Computing.
[44] Stefan G. Weber. Multilaterally Secure Pervasive Cooperation - Privacy Protection, Accountability and Secure Communication for the Age of Pervasive Computing , 2012, Cryptology and Information Security Series.
[45] M. Goodchild,et al. Successful Response Starts with a Map: Improving Geospatial Support for Disaster Management , 2007 .
[46] Stefan G. Weber. Securing First Response Coordination with Dynamic Attribute-Based Encryption , 2009, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.