Privacy & Trust in Ambient Intelligence Environments
暂无分享,去创建一个
Bastian Könings | Björn Wiedersheim | Michael Weber | Bastian Könings | M. Weber | Björn Wiedersheim
[1] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[2] Jadwiga Indulska,et al. Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System , 2007, UIC.
[3] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[4] Michael Rovatsos,et al. Using trust for detecting deceitful agents in artificial societies , 2000, Appl. Artif. Intell..
[5] R. Perlman,et al. An overview of PKI trust models , 1999, IEEE Netw..
[6] Diana K. Smetters,et al. How users use access control , 2009, SOUPS.
[7] Vladimiro Sassone,et al. Trust models in ubiquitous computing , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[8] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[9] Jeffrey S. Rosenschein,et al. Supporting Privacy in Decentralized Additive Reputation Systems , 2004, iTrust.
[10] N. Shahmehri,et al. An Integration of Reputation-based and Policy-based Trust Management , 2005 .
[11] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[12] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[13] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[14] Jorge Lobo,et al. Privacy-aware role based access control , 2009, SACMAT '07.
[15] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[16] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[17] Robert Ellis Smith,et al. Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet , 2000 .
[18] B. Solhaug,et al. Why Trust is not Proportional to Risk , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[19] Christian Damsgaard Jensen,et al. Trading Privacy for Trust , 2004, iTrust.
[20] Norman L. Chervany,et al. Trust and Distrust Definitions: One Bite at a Time , 2000, Trust in Cyber-societies.
[21] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[22] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[23] Hector Garcia-Molina,et al. EigenRep: Reputation Management in P2P Networks , 2003 .
[24] Sandra Steinbrecher. Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities , 2006, SEC.
[25] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[26] Lars Kulik,et al. Location privacy and location-aware computing , 2006 .
[27] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[28] Ralph Arnote,et al. Hong Kong (China) , 1996, OECD/G20 Base Erosion and Profit Shifting Project.
[29] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[30] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[31] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[32] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[33] Sissela Bok,et al. Secrets: On the Ethics of Concealment and Revelation , 1982 .
[34] Jaijit Bhattacharya,et al. Utilizing Network Features for Privacy Violation Detection , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.
[35] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[36] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[37] Juan Carlos Augusto,et al. Learning patterns in ambient intelligence environments: a survey , 2010, Artificial Intelligence Review.
[38] Michael Rohs,et al. Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing , 2005, Ambient Intelligence.
[39] Peter Langendörfer,et al. Enhancing Privacy by Applying Information Flow Modelling in Pervasive Systems , 2007, OTM Workshops.
[40] Michael Weber,et al. Towards Territorial Privacy in Smart Environments , 2010, AAAI Spring Symposium: Intelligent Information Privacy Management.
[41] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[42] Carles Sierra,et al. An information-based model for trust , 2005, AAMAS '05.
[43] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[44] Ketil Stølen,et al. Evolution in Relation to Risk and Trust Management , 2010, Computer.
[45] Marco Gruteser,et al. USENIX Association , 1992 .
[46] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[47] Jordi Sabater-Mir,et al. Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.
[48] William A. Wallace,et al. Trust in electronic environments , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[49] E. Gerck. Overview of Certification Systems: X.509, CA, PGP and SKIP , 1999 .
[50] Javier Carbó,et al. TRUST MANAGEMENT THROUGH FUZZY REPUTATION , 2003 .
[51] Diane J. Cook,et al. Author's Personal Copy Pervasive and Mobile Computing Ambient Intelligence: Technologies, Applications, and Opportunities , 2022 .
[52] Shanshan Song,et al. Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.
[53] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[54] J. Simpson,et al. The Oxford English Dictionary , 1884 .
[55] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[56] Diego Gambetta. Can We Trust Trust , 2000 .
[57] Nick Cercone,et al. A Bayesian Network Approach to Detecting Privacy Intrusion , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.