Privacy throughout the data cycle
暂无分享,去创建一个
[1] Matthew K. O. Lee,et al. An integrative model of consumer trust in internet shopping , 2003, ECIS.
[2] Adeline Nazarenko,et al. Ontologies and Information Extraction , 2006, ArXiv.
[3] L. Mui,et al. A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[4] Diego Gambetta,et al. Measuring people's trust , 2009 .
[5] E. Michael Maximilien,et al. Toward autonomic web services trust and selection , 2004, ICSOC '04.
[6] Rajeev Agrawal,et al. Ranking Privacy Policy , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.
[7] Tingting Han,et al. Diagnosis, Synthesis and Analysis of Probabilistic Models , 2009, Ausgezeichnete Informatikdissertationen.
[8] Carst Tankink. Documentation and formal mathematics : web technology meets theorem proving , 2013 .
[9] Stephen Marsh,et al. Examining Trust, Forgiveness and Regret as Computational Concepts , 2009, Computing with Social Trust.
[10] Esma Aïmeur,et al. UPP: User Privacy Policy for Social Networking Sites , 2009, 2009 Fourth International Conference on Internet and Web Applications and Services.
[11] Stephanie Kemper,et al. Modelling and analysis of real-time coordination patterns , 2011 .
[12] Adriaan Middelkoop,et al. Inference of Program Properties with Attribute Grammars, Revisited , 2012 .
[13] Gerardo Canfora,et al. An empirical comparison of methods to support QoS-aware service selection , 2010, PESOS '10.
[14] L. Festinger,et al. A Theory of Cognitive Dissonance , 2017 .
[15] van der,et al. Domain specific languages and their type systems , 2014 .
[16] M. J. de Mol,et al. Reasoning about functional programs : Sparkle, a proof assistant for Clean , 2009 .
[17] Fabrizio Sebastiani,et al. Machine learning in automated text categorization , 2001, CSUR.
[18] Hung Q. Ngo,et al. A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.
[19] Chi-Chun Lo,et al. A Reputation-Based Service Selection Scheme , 2009, 2009 IEEE International Conference on e-Business Engineering.
[20] Steven M. Bellovin,et al. Privee: An Architecture for Automatically Analyzing Web Privacy Policies , 2014, USENIX Security Symposium.
[21] Jerry den Hartog,et al. Trust and punishment , 2007, Autonomics.
[22] Jean-Marc Robert,et al. Trust in new decision aid systems , 2006, IHM '06.
[23] B. Lijnse,et al. TOP to the rescue. Task-oriented programming for incident response applications , 2005 .
[24] Feng Li,et al. A Holistic Framework for Trust in Online Transactions , 2012 .
[25] Guido Smits,et al. Improved SVM regression using mixtures of kernels , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[26] Tong Zhang,et al. Text Mining: Predictive Methods for Analyzing Unstructured Information , 2004 .
[27] Alicia Ageno,et al. Adaptive information extraction , 2006, CSUR.
[28] Sebastiaan Gijsbert Marinus Cornelissen,et al. Evaluating Dynamic Analysis Techniques for Program Comprehension , 2009 .
[29] L. Lensink,et al. Applying formal methods in software development , 2013 .
[30] Tom Staijen,et al. Graph-based Specification and Verification for Aspect-Oriented Languages , 2010 .
[31] Diego Gambetta. Trust : making and breaking cooperative relations , 1992 .
[32] de A. Bruin,et al. Service-oriented discovery of knowledge : foundations, implementations and applications , 2010 .
[33] Thorsten Joachims,et al. Text Categorization with Support Vector Machines: Learning with Many Relevant Features , 1998, ECML.
[34] L. Jean Camp,et al. Designing for Trust , 2002, Trust, Reputation, and Security.
[35] Mjm Marcel Roeloffzen. Kinetic data structures in the black-box model , 2013 .
[36] Adrianus Johannus Paulus Jeckmans. Cryptographically-Enhanced Privacy for Recommender Systems , 2014 .
[37] David H. Wolpert,et al. Stacked generalization , 1992, Neural Networks.
[38] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[39] Nicola Zannone,et al. Towards the development of privacy-aware systems , 2009, Inf. Softw. Technol..
[40] Georgios Paliouras,et al. Combining Information Extraction Systems Using Voting and Stacked Generalization , 2005, J. Mach. Learn. Res..
[41] Hamish Cunningham,et al. GATE-a General Architecture for Text Engineering , 1996, COLING.
[42] Bas Basten,et al. Ambiguity Detection for Programming Language Grammars , 2011 .
[43] Meagen M Rosenthal. Curriculum vitae for , 2015 .
[44] Young-Joo Moon,et al. Stochastic models for quality of service of component connectors , 2011 .
[45] Ismail Hakki Toroslu,et al. A Semantic-Based User Privacy Protection Framework for Web Services , 2003, ITWP.
[46] A. Rodriguez Yakushev,et al. Towards Getting Generic Programming Ready for Prime Time , 2009 .
[47] R. Polikar,et al. Ensemble based systems in decision making , 2006, IEEE Circuits and Systems Magazine.
[48] Hyunbo Cho,et al. On the functional quality of service (FQoS) to discover and compose interoperable web services , 2009, Expert Syst. Appl..
[49] Batya Friedman,et al. Trust online , 2000, CACM.
[50] R.S.S. O'Connor,et al. Incompleteness & completeness : formalizing logic and analysis in type theory , 2005 .
[51] Nicola Zannone,et al. Data Leakage Quantification , 2014, DBSec.
[52] Dimitris Kanellopoulos,et al. Data Preprocessing for Supervised Leaning , 2007 .
[53] Alfons Laarman,et al. Scalable multi-core model checking , 2014 .
[54] Hugo Jonker,et al. Security matters : privacy in voting and fairness in digital exchange , 2009 .
[55] Mary Beth Rosson,et al. End user concern about security and privacy threats , 2007, SOUPS '07.
[56] Pavel Berkhin,et al. A Survey of Clustering Data Mining Techniques , 2006, Grouping Multidimensional Data.
[57] Lior Rokach,et al. A Survey of Data Leakage Detection and Prevention Solutions , 2012, SpringerBriefs in Computer Science.
[58] Geoff Holmes,et al. Multinomial Naive Bayes for Text Categorization Revisited , 2004, Australian Conference on Artificial Intelligence.
[59] Leonor Barroca,et al. Requirements-Driven Collaborative Choreography Customization , 2009, ICSOC/ServiceWave.
[60] Lorrie Faith Cranor,et al. Use of a P3P user agent by early adopters , 2002, WPES '02.
[61] Yinsheng Li,et al. A Fuzzy Model for Selection of QoS-Aware Web Services , 2006, 2006 IEEE International Conference on e-Business Engineering (ICEBE'06).
[62] Brent A. Scott,et al. Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. , 2007, The Journal of applied psychology.
[63] Xin Jin,et al. Architecture for Data Collection in Database Intrusion Detection Systems , 2007, Secure Data Management.
[64] Alessandro Acquisti,et al. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.
[65] Nikolay Mehandjiev,et al. Multi-criteria service recommendation based on user criteria preferences , 2011, RecSys '11.
[66] J. van den Berg,et al. Reasoning about Java programs in PVS using JML , 2009 .
[67] J. Rotter. Interpersonal trust, trustworthiness, and gullibility. , 1980 .
[68] Boualem Benatallah,et al. A Petri Net-based Model for Web Service Composition , 2003, ADC.
[69] Marcel Verhoef,et al. Modeling and validating distributed embedded real-time control systems , 2009 .
[70] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[71] John Mylopoulos,et al. Hierarchical hippocratic databases with minimal disclosure for virtual organizations , 2006, The VLDB Journal.
[72] Chao Lan,et al. Anomaly Detection , 2018, Encyclopedia of GIS.
[73] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[74] Cor-Paul Bezemer,et al. Performance Optimization of Multi-Tenant Software Systems , 2014 .
[75] Diego Gambetta. Can We Trust Trust , 2000 .
[76] Taiwo Oladipupo Ayodele,et al. Types of Machine Learning Algorithms , 2010 .
[77] John Businge,et al. Co-evolution of the Eclipse SDK Framework and Its Third-Party Plug-Ins , 2013, 2013 17th European Conference on Software Maintenance and Reengineering.
[78] Ronald Middelkoop,et al. Capturing and exploiting abstract views of states in OO verification , 2011 .
[79] Kun Chang Lee,et al. Transfer From Offline Trust to Key Online Perceptions: An Empirical Study , 2007, IEEE Transactions on Engineering Management.
[80] Lior Rokach,et al. Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure , 2011, CCS '11.
[81] Barton A. Weitz,et al. Self-Disclosure on the Web: the Impact of Privacy Policy, Reward, and Company Reputation , 2002 .
[82] Lionel Mamane,et al. Interactive mathematical documents: creation and presentation , 2004 .
[83] D. Halpern. Thought and Knowledge: An Introduction to Critical Thinking , 1995 .
[84] Karina R. Olmos Joffré. Strategies for Context Sensitive Program Transformation , 2009 .
[85] David A. Landgrebe,et al. A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..
[86] Hamish Cunningham,et al. Information Extraction, Automatic , 2006 .
[87] Xiang Fu,et al. Formal Verification of e-Services and Workflows , 2002, WES.
[88] Yifan He,et al. A Comparison among Three Neural Networks for Text Classification , 2006, 2006 8th international Conference on Signal Processing.
[89] Tim K. Cocx,et al. Algorithmic tools for data-oriented law enforcement , 2009 .
[90] Ken Barker,et al. Quantifying Privacy Violations , 2011, Secure Data Management.
[91] Frank S. de Boer,et al. Combining Monitoring with Run-Time Assertion Checking , 2014, SFM.
[92] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[93] Joobin Choobineh,et al. Trust in electronic commerce: definition and theoretical considerations , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[94] I. V. Ramakrishnan,et al. A Framework for Building Privacy-Conscious Composite Web Services , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).
[95] van Mf Marcel Amstel,et al. Assessing and improving the quality of model transformations , 2012 .
[96] Frederick Reiss,et al. SystemT: a system for declarative information extraction , 2009, SGMD.
[97] Clare-Marie Karat,et al. Usable security and privacy: a case study of developing privacy management tools , 2005, SOUPS '05.
[98] Axel Belinfante,et al. JTorX: exploring model-based testing , 2014 .
[99] Hendrik Michaël van der Bijl,et al. On changing models in model-based testing , 2011 .
[100] Jerry den Hartog,et al. On-line trust perception: What really matters , 2011, 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST).
[101] J HoffmanLance,et al. Trust beyond security , 2006 .
[102] Chao-Jung Hsu,et al. Dominant Factors for Online Trust , 2008, 2008 International Conference on Cyberworlds.
[103] M. S. Greiler,et al. Test Suite Comprehension for Modular and Dynamic Systems , 2013 .
[104] Karin Bernsmed,et al. A Server-side Approach to Privacy Policy Matching , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[105] Lars Kotthoff,et al. A Preliminary Evaluation of Machine Learning in Algorithm Selection for Search Problems , 2011, SOCS.
[106] Mari Antonius Cornelis Dekker,et al. Flexible Access Control for Dynamic Collaborative Environments , 2009 .
[107] Jerry den Hartog,et al. Understanding Perceived Trust to Reduce Regret , 2015, Comput. Intell..
[108] Patrick Martin,et al. Reputation-Enhanced QoS-based Web Services Discovery , 2007, IEEE International Conference on Web Services (ICWS 2007).
[109] Neda Yousefi,et al. A proposed model of e-trust for electronic banking , 2015 .
[110] Norman L. Chervany,et al. What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..
[111] Marcus A. Maloof,et al. Detecting Insider Theft of Trade Secrets , 2009, IEEE Security & Privacy.
[112] Barry Smyth,et al. Trust in recommender systems , 2005, IUI.
[113] Paul W. Thurston,et al. A Monte Carlo Study of Missing Item Methods , 2000 .
[114] Sebastián Uchitel,et al. WS-Engineer: A Model-Based Approach to Engineering Web Service Compositions and Choreography , 2007, Test and Analysis of Web Services.
[115] Sharon Paradesi,et al. Integrating Behavioral Trust in Web Service Compositions , 2009, 2009 IEEE International Conference on Web Services.
[116] Thomas Bäck,et al. Mixed-integer evolution strategies for parameter optimization and their applications to medical image analysis , 2005 .
[117] A. Morali,et al. IT architecture-based confidentiality risk assessment in networks of organizations , 2011 .
[118] M. Lynn. Determination and quantification of content validity. , 1986, Nursing research.
[119] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[120] Sharad Mehrotra,et al. XAR: An Integrated Framework for Information Extraction , 2009, 2009 WRI World Congress on Computer Science and Information Engineering.
[121] Somayeh Malakuti Khah Olun Abadi. Event composition model: achieving naturalness in runtime enforcement , 2011 .
[122] Farhad Arbab,et al. Model Checking of Component Connectors , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[123] Sandro Etalle,et al. N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols , 2012, RAID.
[124] Chi-Chun Lo,et al. Fuzzy matchmaking for Web services , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[125] Charles J. Kacmar,et al. Shifting Factors and the Ineffectiveness of Third Party Assurance Seals: A Two-Stage Model of Initial Trust in a Web Business , 2004, Electron. Mark..
[126] Lynette Hirschman,et al. Automating Coreference: The Role of Annotated Training Data , 1998, ArXiv.
[127] Ramakrishnan Srikant,et al. XPref: a preference language for P3P , 2005, Comput. Networks.
[128] Gerhard de Koning Gans,et al. Outsmarting smart cards , 2013 .
[129] Ali Mesbah,et al. Analysis and Testing of Ajax-based Single-page Web Applications , 2009 .
[130] Marit Hansen,et al. Towards Displaying Privacy Information with Icons , 2010, PrimeLife.
[131] Vuong Xuan Tran,et al. QoS Based Ranking for Web Services: Fuzzy Approaches , 2008, 2008 4th International Conference on Next Generation Web Services Practices.
[132] Arthur E. Hoerl,et al. Ridge Regression: Biased Estimation for Nonorthogonal Problems , 2000, Technometrics.
[133] Tim Moses,et al. EXtensible Access Control Markup Language (XACML) version 1 , 2003 .
[134] Aah Ammar Osaiweran. Formal development of control software in the medical systems domain , 2012 .
[135] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[136] Vipin Kumar,et al. Similarity Measures for Categorical Data: A Comparative Evaluation , 2008, SDM.
[137] Annie I. Antón,et al. 'I Need It Now': Improving Website Usability by Contextualizing Privacy Policies , 2004, ICWE.
[138] Sotiris B. Kotsiantis,et al. Supervised Machine Learning: A Review of Classification Techniques , 2007, Informatica.
[139] Scw Bas Ploeger,et al. Improved verification methods for concurrent systems , 2009 .
[140] Joobin Choobineh,et al. An Empirical Evaluation of the Factors Affecting Trust in Web Bankng Systems , 2000 .
[141] Pieter H. Hartel,et al. Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems , 2009, RAID.
[142] Hasan Sözer,et al. Architecting Fault-Tolerant Software Systems , 2009 .
[143] Yiming Yang,et al. Robustness of regularized linear classification methods in text categorization , 2003, SIGIR.
[144] Colin Potts,et al. Privacy policies as decision-making tools: an evaluation of online privacy notices , 2004, CHI.
[145] Ann L. Fruhling,et al. The influence of user interface usability on rural consumers' trust of e-health services , 2006, Int. J. Electron. Heal..
[146] J. Rotter. Generalized expectancies for interpersonal trust. , 1971 .
[147] Thomas L. Saaty,et al. How to Make a Decision: The Analytic Hierarchy Process , 1990 .
[148] Alina A. von Davier,et al. Cross-Validation , 2014 .
[149] Lea Kutvonen,et al. Trust Management Survey , 2005, iTrust.
[150] Jorge Bernardino,et al. Securing Data Warehouses from Web-Based Intrusions , 2012, WISE.
[151] Lacramioara Astefanoaei,et al. An executable theory of multi-agent systems refinement , 2011 .
[152] van Mpwj Michiel Osch. Automated model-based testing of hybrid systems , 2009 .
[153] Z Zvezdan Protic,et al. Configuration management for models : generic methods for model comparison and model co-evolution , 2011 .
[154] Susan Wiedenbeck,et al. On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..
[155] Diana Maynard,et al. JAPE: a Java Annotation Patterns Engine , 2000 .
[156] Lori N. K. Leonard,et al. Trust in consumer-to-consumer electronic commerce , 2008, Inf. Manag..
[157] Ingoo Han,et al. The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce , 2003, Int. J. Electron. Commer..
[158] C. Johnson-George,et al. Measurement of specific interpersonal trust: Construction and validation of a scale to assess trust in a specific other. , 1982 .
[159] Chih-Jen Lin,et al. A Practical Guide to Support Vector Classication , 2008 .
[160] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[161] Annie I. Antón,et al. Financial privacy policies and the need for standardization , 2004, IEEE Security & Privacy Magazine.
[162] Wouter Meulemans,et al. Similarity measures and algorithms for cartographic schematization , 2014 .
[163] John D. Lee,et al. Trust in Automation: Designing for Appropriate Reliance , 2004, Hum. Factors.
[164] Michael Mrissa,et al. Privacy-Aware DaaS Services Composition , 2011, DEXA.
[165] Lior Rokach,et al. M-Score: A Misuseability Weight Measure , 2012, IEEE Transactions on Dependable and Secure Computing.
[166] Xin Jin,et al. Database Intrusion Detection Using Role Profiling with Role Hierarchy , 2009, Secure Data Management.
[167] C. J. Boogerd,et al. Focusing Automatic Code Inspections , 2010 .
[168] Scott Flinn,et al. User Perceptions of Privacy and Security on the Web , 2005, PST.
[169] Audun Jøsang,et al. Privacy Policy Referencing , 2010, TrustBus.
[170] Eduardo Zambon,et al. Abstract Graph Transformation - Theory and Practice , 2013 .
[171] Azadeh Iranmehr,et al. Trust Management for Semantic Web , 2009, 2009 Second International Conference on Computer and Electrical Engineering.
[172] Kees van Deemter,et al. On Coreferring: Coreference in MUC and Related Annotation Schemes , 2000, CL.
[173] J. Doug Tygar,et al. Systematic analysis and evaluation of web privacy policies and implementations , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[174] J. Kwisthout,et al. The Computational Complexity of Probabilistic Networks , 2009 .
[175] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[176] A. Everard,et al. Effect of Presentation Flaws on Users' Perception of Quality of On-Line Stores' Web Sites: Is it Perception that Really Counts? , 2003 .
[177] Omer Tene Jules Polonetsky,et al. Privacy in the Age of Big Data: A Time for Big Decisions , 2012 .
[178] Martin R. Neuhäußer,et al. Model checking nondeterministic and randomly timed systems , 2010 .
[179] Ardion Beldad,et al. How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust , 2010, Comput. Hum. Behav..
[180] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[181] Jerry den Hartog,et al. Hunting the Unknown - White-Box Database Leakage Detection , 2014, DBSec.
[182] David W. Chadwick,et al. A controlled natural language interface for authoring access control policies , 2011, SAC.
[183] Jerry den Hartog,et al. Trust Management and User’s Trust Perception in e-Business , 2013 .
[184] Silvana Faja,et al. E-Health: An Exploratory Study of Trust Building Elements in Behavioral Health , 2006 .
[185] Huan Liu,et al. Chi2: feature selection and discretization of numeric attributes , 1995, Proceedings of 7th IEEE International Conference on Tools with Artificial Intelligence.
[186] Wei-Yin Loh,et al. Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..
[187] Shankar Ganesan. Determinants of Long-Term Orientation in Buyer-Seller Relationships , 1994 .
[188] Lennart C. L. Kats,et al. Building Blocks for Language Workbenches , 2011 .
[189] Ehud Gudes,et al. DIWeDa - Detecting Intrusions in Web Databases , 2008, DBSec.
[190] John Mylopoulos,et al. Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology , 2010, Advances in Intelligent Information Systems.
[191] Andrew P. Bradley,et al. The use of the area under the ROC curve in the evaluation of machine learning algorithms , 1997, Pattern Recognit..
[192] D. Freedman,et al. On the histogram as a density estimator:L2 theory , 1981 .
[193] Bonnie M. Muir,et al. Trust Between Humans and Machines, and the Design of Decision Aids , 1987, Int. J. Man Mach. Stud..
[194] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[195] Weider D. Yu,et al. A Privacy Assessment Approach for Serviced Oriented Architecture Application , 2006, 2006 Second IEEE International Symposium on Service-Oriented System Engineering (SOSE'06).
[196] Ryan A. Rossi,et al. Automatically identifying relations in privacy policies , 2009, SIGDOC '09.
[197] Jja Jeroen Keiren,et al. Advanced reduction techniques for model checking , 2013 .
[198] Gavin Brown,et al. Ensemble Learning , 2010, Encyclopedia of Machine Learning and Data Mining.
[199] N. L. Chervany,et al. Initial Trust Formation in New Organizational Relationships , 1998 .
[200] M. Abdullah,et al. Consumers' E-commerce acceptance model: Antecedents of trust and satisfaction constructs , 2012, 2012 IEEE Business, Engineering & Industrial Applications Colloquium (BEIAC).
[201] Joost Winter,et al. Coalgebraic Characterizations of Automata-Theoretic Classes , 2014 .
[202] Milan Petkovic,et al. What websites know about you : privacy policy analysis using information extraction , 2013 .
[203] Sonia San Martín Gutiérrez,et al. A Cross-National Study on Online Consumer Perceptions, Trust, and Loyalty , 2012, J. Organ. Comput. Electron. Commer..
[204] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .
[205] Elizabeth Sillence,et al. Developing Trust Practices for E-Health , 2007 .
[206] Charles J. Kacmar,et al. Trust in e-commerce vendors: a two-stage model , 2000, ICIS.
[207] Achim D. Brucker,et al. Extending access control models with break-glass , 2009, SACMAT '09.
[208] S. Gregor,et al. Measuring Human-Computer Trust , 2000 .
[209] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[210] Yiming Yang,et al. An Evaluation of Statistical Approaches to Text Categorization , 1999, Information Retrieval.
[211] Scott Dick,et al. P3P Adoption on E-Commerce Web sites: A Survey and Analysis , 2007, IEEE Internet Computing.
[212] Francisco Curbera,et al. Web Services Business Process Execution Language Version 2.0 , 2007 .
[213] Nicola Zannone,et al. Privacy-Aware Web Service Composition and Ranking , 2013, 2013 IEEE 20th International Conference on Web Services.
[214] Fabian Hungerland,et al. The Digital Economy , 2021, Introduction to Digital Economics.
[215] Dhp Dirk Gerrits. Pushing and pulling : computing push plans for disk-shaped robots, and dynamic labelings for moving points , 2013 .
[216] Barbara Carminati,et al. A Privacy-Preserving Approach for Web Service Selection and Provisioning , 2011, 2011 IEEE International Conference on Web Services.
[217] Jerry R. Hobbs. The Generic Information Extraction System , 1993, MUC.
[218] Phongphun Kijsanayothin,et al. Privacy and Recovery in Composite Web Service Transactions , 2010 .
[219] Fei-Yu Xu,et al. Bootstrapping relation extraction from semantic seeds , 2008 .
[220] Sholom M. Weiss,et al. Automated learning of decision rules for text categorization , 1994, TOIS.
[221] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[222] R. Bakhshi. Gossiping Models : Formal Analysis of Epidemic Protocols , 2011 .
[223] Tim K. Cocx,et al. Metrics and visualisation for crime analysis and genomics , 2005 .
[224] Chih-Chien Wang,et al. Knowledge and Trust in E-consumers' Online Shopping Behavior , 2008, 2008 International Symposium on Electronic Commerce and Security.
[225] Sander van der Burg,et al. A Reference Architecture for Distributed Software Deployment , 2013 .
[226] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[227] M Muhammad Atif,et al. Formal modeling and verification of distributed failure detectors , 2011 .
[228] Georgeta Igna,et al. Performance analysis of real-time task systems using timed automata , 2013 .
[229] Marco Vieira,et al. Integrated Intrusion Detection in Databases , 2007, LADC.
[230] van den,et al. Composition and synchronization of real-time components upon one processor , 2013 .
[231] van Pja Paul Tilburg. From computability to executability : a process-theoretic view on automata theory , 2011 .
[232] David R. Karger,et al. Tackling the Poor Assumptions of Naive Bayes Text Classifiers , 2003, ICML.
[233] Jerry den Hartog,et al. Database anomalous activities detection and quantification , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[234] Michael Gertz,et al. DEMIDS: A Misuse Detection System for Database Systems , 2000, IICIS.
[235] Diego Calvanese,et al. Synthesis of underspecified composite e-services based on automated reasoning , 2004, ICSOC '04.
[236] Andrew McCallum,et al. A comparison of event models for naive bayes text classification , 1998, AAAI 1998.
[237] Miguel E. Andrés,et al. Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems , 2011, ArXiv.
[238] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[239] Weider D. Yu,et al. PPMLP: A Special Modeling Language Processor for Privacy Policies , 2007, 2007 12th IEEE Symposium on Computers and Communications.
[240] L. Macía,et al. A Charter of Fundamental Rights for the European Union , 2000 .
[241] Wolfgang Nejdl,et al. A hybrid approach for efficient Web service composition with end-to-end QoS constraints , 2012, TWEB.
[242] Clare-Marie Karat,et al. An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench , 2006, SOUPS '06.
[243] Oleksiy Mazhelis,et al. One-class classifiers : a review and analysis of suitability in the context of mobile-masquerader detection , 2006, South Afr. Comput. J..
[244] Peter E. Hart,et al. Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.
[245] Michael Meier,et al. Learning SQL for Database Intrusion Detection using Context-Sensitive Modelling , 2009, LWA.
[246] Janine S. Hiller. The Regulatory Framework for Privacy and Security , 2009 .
[247] Rolf Schwitter,et al. English as a formal specification language , 2002, Proceedings. 13th International Workshop on Database and Expert Systems Applications.
[248] Anneli Folkesson,et al. World Wide Web Consortium (W3C) , 2005 .
[249] Jerry den Hartog,et al. A machine learning solution to assess privacy policy completeness: (short paper) , 2012, WPES '12.
[250] Mark Timmer,et al. Efficient modelling, generation and analysis of Markov automata , 2013 .
[251] Elisa Bertino,et al. Detecting anomalous access patterns in relational databases , 2008, The VLDB Journal.
[252] Henry Farrell,et al. Constructing the International Foundations of E-Commerce—The EU-U.S. Safe Harbor Arrangement , 2003, International Organization.
[253] Jan de Leeuw,et al. Gifi Methods for Optimal Scaling in R: The Package homals , 2009 .
[254] B. J. Arnoldus,et al. An illumination of the template enigma : software code generation with templates , 2011 .
[255] Ralph L. Keeney,et al. Book Reviews : Scientific Opportunities and Public Needs: Improv ing Priority Setting and Public Input at the National Institutes of Health. Institute of Medicine. Washington, DC: National Academy Press, 1998, 136 pages, $26.00 , 1998 .