An information privacy taxonomy for collaborative environments
暂无分享,去创建一个
[1] David Chaum,et al. Achieving Electronic Privacy , 1992 .
[2] Marc Langheinrich,et al. Privacy Invasions in Ubiquitous Computing , 2002 .
[3] Geoff Skinner,et al. Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).
[4] Michael Waidner,et al. Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data , 2002, Privacy Enhancing Technologies.
[5] Yitao Duan,et al. Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments , 2004, Privacy Enhancing Technologies.
[6] Michael Backes,et al. Efficient comparison of enterprise privacy policies , 2004, SAC '04.
[7] Birgit Pfitzmann,et al. A Toolkit for Managing Enterprise Privacy Policies , 2003, ESORICS.
[8] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[9] Ramakrishnan Srikant,et al. Implementing P3P using database technology , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[10] Carlos Jensen,et al. Privacy in Digital Environments: Empowering Users , 2002 .
[11] Alfred Kobsa,et al. Preserving Privacy in Awareness Systems , 2004, Wissen in Aktion.
[12] David Chaum,et al. Security without Identification: Card Computers to make Big Brother Obsolete , 1985 .
[13] David Chaum,et al. A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations , 1986, CRYPTO.
[14] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[15] P. Schwartz. Privacy and Democracy in Cyberspace , 2000 .
[16] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[17] Günter Karjoth,et al. A privacy policy model for enterprises , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[18] Victoria Bellotti,et al. What You Don't Know Can Hurt You: Privacy in Collaborative Computing , 1996, BCS HCI.
[19] Elizabeth D. Mynatt,et al. Enabling privacy management in ubiquitous com-puting environments through trust and reputation syste , 2002 .
[20] David Chaum,et al. Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms , 1985, EUROCRYPT.