User-Controllable Security and Privacy for Pervasive Computing
暂无分享,去创建一个
Lujo Bauer | Michael K. Reiter | Norman Sadeh | Jason Hong | Gary Hsieh | Bruce M. McLaren | Jinghai Rao | Karen P. Tang | Kami Vaniea | Lorrie Faith Cranor | Ian Fette | Jason Cornwell | Madhu Prabaker
[1] James Fogarty,et al. Toolkit support for developing and deploying sensor-based statistical models of human situations , 2007, CHI.
[2] Sameer Patil,et al. Who gets to know what when: configuring privacy permissions in an awareness application , 2005, CHI.
[3] Fabien L. Gandon,et al. Chapter 2: Ambient Intelligence: The MyCampus Experience , 2006 .
[4] Lujo Bauer,et al. Lessons learned from the deployment of a smartphone-based access-control system , 2007, SOUPS '07.
[5] Clare-Marie Karat,et al. Usable privacy and security for personal information management , 2006, CACM.
[6] Robert W. Reeder,et al. Improving user-interface dependability through mitigation of human error , 2005, Int. J. Hum. Comput. Stud..
[7] Lorrie Faith Cranor,et al. User interfaces for privacy agents , 2006, TCHI.
[8] Clare-Marie Karat,et al. Usable security and privacy: a case study of developing privacy management tools , 2005, SOUPS '05.
[9] Lujo Bauer,et al. Device-Enabled Authorization in the Grey System ¶ , 2006 .
[10] Fabien L. Gandon,et al. Ambient Intelligence: The MyCampus Experience , 2005 .
[11] Bill N. Schilit,et al. Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.