Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy
暂无分享,去创建一个
[1] Peter Schaar,et al. Privacy by Design , 2010 .
[2] Johann Cas,et al. Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.
[3] E. Thacker,et al. THE EXPLOIT: A THEORY OF NETWORKS , 2007, Soundings: An Interdisciplinary Journal.
[4] D. Boyd. Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life , 2007 .
[5] J. Dumortier. Directive 98/48/EC of the European Parliament and of the Council , 2006 .
[6] Katherine J. Strandburg,et al. Privacy and Technologies of Identity: A Cross-Disciplinary Conversation , 2005 .
[7] L. Macía,et al. A Charter of Fundamental Rights for the European Union , 2000 .
[8] C. Allen,et al. Stanford Encyclopedia of Philosophy , 2011 .
[9] Robert M. Deiters. Organization for Economic Co-Operation and Development (OECD). , 1968 .
[10] Siani Pearson,et al. Towards Accountable Management of Privacy and Identity Information , 2003, ESORICS.
[11] G. Marx. Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.
[12] Stuart S. Shapiro,et al. Privacy by design , 2010, Commun. ACM.
[13] M. Kamali,et al. The dignity of man: an Islamic perspective , 2002 .