메뉴 건너뛰기




Volumn , Issue , 2004, Pages 103-111

Owner-controlled information

Author keywords

Architecture; Privacy; Security

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER SOFTWARE; DATA MINING; DATABASE SYSTEMS; INTERFACES (COMPUTER); RELIABILITY; RESEARCH; SECURITY OF DATA;

EID: 17644363402     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (30)
  • 4
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 5
    • 0003582713 scopus 로고    scopus 로고
    • Beyond concern: Understanding net users' attitudes about online privacy
    • AT&T Labs, Apr.
    • L. F. Cranor, J. Reagle, and M. S. Ackerman. Beyond concern: Understanding net users' attitudes about online privacy. Technical Report TR 99.4.3, AT&T Labs, Apr. 1999.
    • (1999) Technical Report TR 99.4.3
    • Cranor, L.F.1    Reagle, J.2    Ackerman, M.S.3
  • 6
    • 17644378243 scopus 로고    scopus 로고
    • Commentary: The threat of Microsoft's. NET
    • Last visited: 17 July 2003
    • W. Diffie and S. Landau. Commentary: The threat of Microsoft's.NET. kingpublishing.com, 2001. Last visited: 17 July 2003.
    • (2001) Kingpublishing.com
    • Diffie, W.1    Landau, S.2
  • 7
    • 17644420903 scopus 로고    scopus 로고
    • Private communication between John Dobson and Steven J. Greenwald at NSPW 1996 as referenced by Greenwald
    • J. Dobson. Private communication between John Dobson and Steven J. Greenwald at NSPW 1996 as referenced by Greenwald, 2003.
    • (2003)
    • Dobson, J.1
  • 8
    • 17644401542 scopus 로고    scopus 로고
    • Last visited: 17 July 2003
    • Electronic Privacy Information Center. Microsoft passport investigation docket, http://www.epic.org/privacy/consumer/microsoft/passport.html, 2003. Last visited: 17 July 2003.
    • (2003) Microsoft Passport Investigation Docket
  • 10
    • 33845284254 scopus 로고    scopus 로고
    • Using biometrics as an enabling technology in balancing universality and selectivity for management of information access
    • Paris, France. Springer-Verlag Heidelberg. Lecture Notes in Computer Science 2615. October 24-25, 2002
    • M. Fairhurst, R. Guest, F. Deravi, and J. George. Using biometrics as an enabling technology in balancing universality and selectivity for management of information access. In Universal Access. Theoretical Perspectives, Practice, and Experience: 7th ERCIM International Workshop on User Interfaces for All, pages 249-259, Paris, France, 2002. Springer-Verlag Heidelberg. Lecture Notes in Computer Science 2615. October 24-25, 2002.
    • (2002) Universal Access. Theoretical Perspectives, Practice, and Experience: 7th ERCIM International Workshop on User Interfaces for All , pp. 249-259
    • Fairhurst, M.1    Guest, R.2    Deravi, F.3    George, J.4
  • 11
    • 17644417989 scopus 로고    scopus 로고
    • Big brother award nomination for WPA, passport pains MS
    • 1 April. Last visited: 17 July 2003
    • J. Lettice. Big Brother Award nomination for WPA, Passport pains MS. The Register, 2001. 1 April 2003. Last visited: 17 July 2003.
    • (2001) The Register
    • Lettice, J.1
  • 12
    • 17644410588 scopus 로고    scopus 로고
    • Last visited: 17 July 2003
    • Liberty Alliance. Liberty Alliance project. http://www.projectliberty. org/, 2003. Last visited: 17 July 2003.
    • (2003) Liberty Alliance Project
  • 13
    • 84871602696 scopus 로고    scopus 로고
    • webservices.xml.com, 1 April 2003. Last visited: 17 July 2003
    • P. Madsen. The Liberty Alliance, webservices.xml.com, 2003. 1 April 2003. Last visited: 17 July 2003.
    • (2003) The Liberty Alliance
    • Madsen, P.1
  • 19
    • 2442419307 scopus 로고    scopus 로고
    • Trusted agents that enhance user privacy by self-profiling
    • HP Laboratories
    • S. Pearson. Trusted agents that enhance user privacy by self-profiling. Technical Report HPL-2002-196, HP Laboratories, 2002.
    • (2002) Technical Report , vol.HPL-2002-196
    • Pearson, S.1
  • 20
    • 17644388294 scopus 로고    scopus 로고
    • Trusted computing platforms, the next security solution
    • HP Laboratories
    • S. Pearson. Trusted computing platforms, the next security solution. Technical Report HPL-2002-221, HP Laboratories, 2002.
    • (2002) Technical Report , vol.HPL-2002-221
    • Pearson, S.1
  • 22
    • 0003614529 scopus 로고    scopus 로고
    • SDSI-a simple distributed security infrastructure
    • Last visited: 27 May 2002
    • R. L. Rivest and B. Lampson. SDSI-a simple distributed security infrastructure, http://theory.lcs.mit.edu/~rivest/sdsi10.ps, 1996. Presented at CRYPTO '96. Last visited: 27 May 2002.
    • (1996) CRYPTO '96
    • Rivest, R.L.1    Lampson, B.2
  • 24
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • R. S. Sandhu and P. Samarati. Access control: principles and practice. IEEE Communications, 32(9):40-48, 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 25
    • 17644411629 scopus 로고    scopus 로고
    • Private communication at NSPW 2003 with Carrie Gates. 20 August
    • M. A. Sasse. Private communication at NSPW 2003 with Carrie Gates. 20 August 2003.
    • (2003)
    • Sasse, M.A.1
  • 26
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' -a human/computer interaction approach to usable and effective security
    • M. A. Sasse, S. Brostoff, and D. Weirich. Transforming the 'weakest link' -a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3):122-131, 2001.
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 27
    • 17644428215 scopus 로고    scopus 로고
    • U.S. Army. Common Access Card (CAC). Last visited: 17 July 2003
    • Secure Electronic Transactions - Devices, U.S. Army. Common access card (CAC). https://setdweb.setd.army.mil/cac/whatiscac.htm. Last visited: 17 July 2003.
    • Secure Electronic Transactions - Devices
  • 28
    • 33744810750 scopus 로고    scopus 로고
    • Last visited: 17 July 2003
    • M. Slemko. Microsoft passport to trouble. http://alive.znep.com/~marcs/ passport/, 2001. Last visited: 17 July 2003.
    • (2001) Microsoft Passport to Trouble
    • Slemko, M.1
  • 30
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • Washington, D.C. Usenix. August 23-26, 1999
    • A. Whitten and J. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, pages 169-184, Washington, D.C., 1999. Usenix. August 23-26, 1999.
    • (1999) Proceedings of the 8th USENIX Security Symposium , pp. 169-184
    • Whitten, A.1    Tygar, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.