-
1
-
-
0002131454
-
Design for privacy in ubiquitous computing environments
-
Kluwer, Dordrecht, the Netherlands
-
V. Bellotti and A. Seilen, "Design for Privacy in Ubiquitous Computing Environments," Proc. 3rd European Conf. Computer Supported Cooperative Work (ECSCW 93), Kluwer, Dordrecht, the Netherlands, 1993, pp. 77-92.
-
(1993)
Proc. 3rd European Conf. Computer Supported Cooperative Work (ECSCW 93)
, pp. 77-92
-
-
Bellotti, V.1
Seilen, A.2
-
2
-
-
4544341979
-
The last link: Default = Offline or why ubicomp scares me
-
Oct.
-
S. Doheny-Farina, "The Last Link: Default = Offline Or Why Ubicomp Scares Me," J. Computer-Mediated Communication, vol. 1, no. 6, Oct. 1994, pp. 18-20.
-
(1994)
J. Computer-mediated Communication
, vol.1
, Issue.6
, pp. 18-20
-
-
Doheny-Farina, S.1
-
3
-
-
84937391117
-
Approximate information flows: Socially based modeling of privacy in ubiquitous computing
-
to be published Springer-Verlag, Berlin
-
X. Jiang, J. Hong, and J. Landay, "Approximate Information Flows: Socially Based Modeling of Privacy in Ubiquitous Computing," to be published in Proc. 4th Int'l Conf. Ubiquitous Computing (Ubicomp 2002), Springer-Verlag, Berlin, 2002.
-
(2002)
Proc. 4th Int'l Conf. Ubiquitous Computing (Ubicomp 2002)
-
-
Jiang, X.1
Hong, J.2
Landay, J.3
-
4
-
-
0033645573
-
Engineering authority and trust in cyberspace: The OM-AM and RBAC way
-
ACM Press, New York
-
R. Sandhu, "Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way," Proc. 5th ACM Workshop on RBAC, ACM Press, New York, 2000, pp. 111-119.
-
(2000)
Proc. 5th ACM Workshop on RBAC
, pp. 111-119
-
-
Sandhu, R.1
-
5
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
Dec.
-
L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments," Computer, vol. 34, no. 12, Dec. 2001, pp. 154-157.
-
(2001)
Computer
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
6
-
-
0035568958
-
Changing places: Contexts of awareness in computing
-
Mar.
-
P. Arge, "Changing Places: Contexts of Awareness in Computing," Human-Computer Interaction, vol. 16, nos. 2-4, Mar. 2001, pp. 177-192.
-
(2001)
Human-computer Interaction
, vol.16
, Issue.2-4
, pp. 177-192
-
-
Arge, P.1
-
7
-
-
0342954968
-
Integrating information appliances into an interactive workspace
-
May/June
-
A. Fox et al., "Integrating Information Appliances into an Interactive Workspace," IEEE Computer Graphics & Applications, vol. 20, no. 3, May/June 2000, pp. 54-65.
-
(2000)
IEEE Computer Graphics & Applications
, vol.20
, Issue.3
, pp. 54-65
-
-
Fox, A.1
-
9
-
-
34147215372
-
Murky conceptual waters: The public and the private
-
G.T. Marx, "Murky Conceptual Waters: The Public and the Private," Ethics and Information Technology, vol. 3, no. 3, 2001, pp. 157-169.
-
(2001)
Ethics and Information Technology
, vol.3
, Issue.3
, pp. 157-169
-
-
Marx, G.T.1
-
10
-
-
0242456750
-
Towards usage control models: Beyond traditional access control
-
ACM Press, New York
-
J. Park and R. Sandhu, "Towards Usage Control Models: Beyond Traditional Access Control," Proc. 7th ACM Symp. Access Control Models and Technologies (SAC-MAT 02), ACM Press, New York, 2002, pp. 57-64.
-
(2002)
Proc. 7th ACM Symp. Access Control Models and Technologies (SAC-MAT 02)
, pp. 57-64
-
-
Park, J.1
Sandhu, R.2
|