Personal Agent for Services in ITS
暂无分享,去创建一个
[1] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[2] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[3] CranorLorrie Faith,et al. User interfaces for privacy agents , 2006 .
[4] Maryline Laurent,et al. XPACML eXtensible Privacy Access Control Markup Langua , 2010, The Second International Conference on Communications and Networking.
[5] Fredrik Olsson,et al. Mirroring your web presence , 2008, SSM '08.
[6] Toru Nakamura,et al. PPM: Privacy Policy Manager for Personalized Services , 2013, CD-ARES Workshops.
[7] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[8] Lorrie Faith Cranor,et al. Use of a P3P user agent by early adopters , 2002, WPES '02.
[9] Carlos José Pereira de Lucena,et al. Modeling multi-agent systems , 2007, CACM.
[10] Chris Macrae. Right Side Up - Building Brands in the Age of the Organised Consumer , 2002 .
[11] Debmalya Biswas. Privacy policies change management for smartphones , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[12] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[13] Ling Liu,et al. A Customizable k-Anonymity Model for Protecting Location Privacy , 2004 .
[14] George Yee. An Automatic Privacy Policy Agreement Checker for E-services , 2009, 2009 International Conference on Availability, Reliability and Security.
[15] Roksana Boreli,et al. Differential privacy in intelligent transportation systems , 2013, WiSec '13.
[16] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[17] Deborah Estrin,et al. Participatory sensing: applications and architecture , 2010, MobiSys '10.
[18] Marco Gruteser,et al. USENIX Association , 1992 .
[19] Johann-Christoph Freytag,et al. PeRA: Individual Privacy Control in Intelligent Transportation Systems , 2013, BTW.
[20] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[21] Michael Backes,et al. Efficient comparison of enterprise privacy policies , 2004, SAC '04.
[22] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[23] Jörn Altmann,et al. UNIQuE: A User-Centric Framework for Network Identity Management , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[24] Claudio Bettini,et al. A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation , 2007, 2007 International Conference on Mobile Data Management.
[25] Günther Pernul,et al. Generating User-Understandable Privacy Preferences , 2009, 2009 International Conference on Availability, Reliability and Security.
[26] Lorrie Faith Cranor,et al. P3P: Making Privacy Policies More Useful , 2003, IEEE Secur. Priv..
[27] Irene Pollach,et al. What's wrong with online privacy policies? , 2007, CACM.
[28] Alexandre M. Bayen,et al. Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring via Virtual Trip Lines , 2012, IEEE Transactions on Mobile Computing.
[29] Marek Hatala,et al. Enabling User Control with Personal Identity Management , 2007, IEEE International Conference on Services Computing (SCC 2007).
[30] F. Kargl,et al. CANE: A Controlled Application Environment for privacy protection in ITS , 2012, 2012 12th International Conference on ITS Telecommunications.
[31] Ali Dehghantanha,et al. Towards a Pervasive Formal Privacy Language , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.
[32] Florian Schaub,et al. WiSec 2011 demo: PRECIOSA PeRA -- practical enforcement of privacy policies in intelligent transportation systems , 2011, MOCO.
[33] Colin Potts,et al. Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..
[34] Lorrie Faith Cranor,et al. User interfaces for privacy agents , 2006, TCHI.
[35] Morris Sloman,et al. Privacy Butler: A personal privacy rights manager for online presence , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[36] C. Michael Sperberg-McQueen,et al. World Wide Web Consortium , 2009, Encyclopedia of Database Systems.
[38] David W. Chadwick,et al. Federated Identity Management , 2009, FOSAD.
[39] Mohamed F. Mokbel,et al. Towards Privacy-Aware Location-Based Database Servers , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).
[40] Sabrina De Capitani di Vimercati,et al. An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.
[41] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .