-
1
-
-
34249659475
-
Privacy issues in human-computer interaction
-
L. Cranor & S. Garfinkel Eds, Sebastopol, CA: O'Reilly
-
Ackerman, M., & Mainwaring, S. (2005). Privacy issues in human-computer interaction. In L. Cranor & S. Garfinkel (Eds.) Security and Usability: Designing Secure Systems That People Can Use, Sebastopol, CA: O'Reilly, 381-400.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
, pp. 381-400
-
-
Ackerman, M.1
Mainwaring, S.2
-
2
-
-
0029697680
-
-
Anderson R. J. A (1996). Security Policy Model for Clinical Information Systems. In the Proceedings of the 1996 IEEE Symposium on Security and Privacy, 30-43.
-
Anderson R. J. A (1996). Security Policy Model for Clinical Information Systems. In the Proceedings of the 1996 IEEE Symposium on Security and Privacy, 30-43.
-
-
-
-
4
-
-
0344927756
-
Implementing P3P Using Database Technology
-
Bangalore, India
-
Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2003). Implementing P3P Using Database Technology. Proceedings of the 19' International Conference on Data Engineering, Bangalore, India.
-
(2003)
Proceedings of the 19' International Conference on Data Engineering
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
5
-
-
19944418651
-
-
Member Submission
-
Ashley, P., Hada, S., Karjoth, G., Powers, C., and Schunter, M. (2003). Enterprise Privacy Architecture Language (EPAL 1.2). W3C Member Submission. http://www.w3.org/Submission/EPAL/
-
(2003)
Enterprise Privacy Architecture Language (EPAL 1.2)
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
7
-
-
33748362881
-
Usable Security and Privacy: A Case Study of Developing Privacy Management Tools
-
ACM Digital Library
-
Brodie, C., Karat, C., and Karat, J. (2005). Usable Security and Privacy: A Case Study of Developing Privacy Management Tools. Proceedings of the Symposium on Usable Privacy and Security, (SOUPS '05), ACM Digital Library.
-
(2005)
Proceedings of the Symposium on Usable Privacy and Security, (SOUPS '05)
-
-
Brodie, C.1
Karat, C.2
Karat, J.3
-
10
-
-
34250768651
-
Privacy policies and privacy preferences
-
L. Cranor & S. Garfinkel Eds, Sebastopol, CA: O'Reilly
-
Cranor, L. (2005). Privacy policies and privacy preferences. In L. Cranor & S. Garfinkel (Eds.) Security and Usability: Designing Secure Systems That People Can Use, Sebastopol, CA: O'Reilly, 447-472.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
, pp. 447-472
-
-
Cranor, L.1
-
11
-
-
34250779279
-
-
IBM Research UIMA
-
IBM Research UIMA(2005) http://www.research.ibm.com/UIMA/
-
(2005)
-
-
-
12
-
-
34250694036
-
-
IBM Tivoli Privacy Manager for eBusiness
-
IBM Tivoli Privacy Manager for eBusiness (2004). http://www-306.ibm. com/software/tivoli/products/privacy-mgr-e-bus/.
-
(2004)
-
-
-
13
-
-
33745812093
-
Evaluating interfaces for privacy policy rule authoring
-
ACM Press
-
Karat, C., Karat, J., Brodie, C., and Feng, J. (2006). Evaluating interfaces for privacy policy rule authoring. Proceedings of the Conference on Human Factors in Computing Systems - CHI 2006, ACM Press, 83-92.
-
(2006)
Proceedings of the Conference on Human Factors in Computing Systems - CHI 2006
, pp. 83-92
-
-
Karat, C.1
Karat, J.2
Brodie, C.3
Feng, J.4
-
14
-
-
19944382845
-
Privacy in information technology: Designing to enable privacy policy management in organizations
-
Karat, J., Karat, C., Brodie, C., and Feng, J. (2005). Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human Computer Studies, 63, 1-2, 153-174.
-
(2005)
International Journal of Human Computer Studies
, vol.63
-
-
Karat, J.1
Karat, C.2
Brodie, C.3
Feng, J.4
-
16
-
-
0034872752
-
Natural-language processing support for developing policy-governed software systems
-
IEEE Computer Society Press, pp
-
Michael, J.B., Ong V. L., and Rowe N. C, (2001) "Natural-language processing support for developing policy-governed software systems", 39th International Conference on Technology for Object-Oriented Languages and Systems, IEEE Computer Society Press, pp. 263-274.
-
(2001)
39th International Conference on Technology for Object-Oriented Languages and Systems
, pp. 263-274
-
-
Michael, J.B.1
Ong, V.L.2
Rowe, N.C.3
-
17
-
-
34250765527
-
-
Microsoft Internet Explorer
-
Microsoft Internet Explorer (2004). Help Safeguard your privacy on the web. http://www.microsoft.com/windows/ie/using/howto/privacy/config.mspx
-
(2004)
Help Safeguard your privacy on the web
-
-
-
18
-
-
34250741829
-
-
Neff, M., Byrd, R., and Boguraev, B. (2003) The Talent system: TEX-TRACT architecture and data model. In Proceedings of HLT-NAACL Workshop on Software Engineering and Architectures of Language Technology Systems, Edmonton, Alberta, Canada.
-
Neff, M., Byrd, R., and Boguraev, B. (2003) The Talent system: TEX-TRACT architecture and data model. In Proceedings of HLT-NAACL Workshop on Software Engineering and Architectures of Language Technology Systems, Edmonton, Alberta, Canada.
-
-
-
-
19
-
-
34250747307
-
-
OASIS 2005, extensible Access Control Markup Language Version 2.0
-
OASIS (2005). extensible Access Control Markup Language Version 2.0. http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os. pdf.
-
-
-
-
20
-
-
34250708874
-
-
OASIS (2005). Privacy Policy Profile of XACML v2.0. http://docs.oasis- open.orig/xacml/2.0/PRIVACYPROFILE/access_control-xacml-2.0-privacy_profile- specos.pdf.
-
OASIS (2005). Privacy Policy Profile of XACML v2.0. http://docs.oasis- open.orig/xacml/2.0/PRIVACYPROFILE/access_control-xacml-2.0-privacy_profile- specos.pdf.
-
-
-
-
22
-
-
0027805822
-
Privacy policies and practices: Inside the organizational maze
-
Smith, J. (1993). Privacy policies and practices: Inside the organizational maze. Communications of the ACM, 36, 12, 105-122.
-
(1993)
Communications of the ACM
, vol.36
, Issue.12
, pp. 105-122
-
-
Smith, J.1
-
23
-
-
85084161247
-
-
Whitten, A. and Tygar J. D. (1999) Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 9th USENIX Security Symposium, August, 1999.
-
Whitten, A. and Tygar J. D. (1999) Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 9th USENIX Security Symposium, August, 1999.
-
-
-
-
24
-
-
34250712744
-
-
W3C (2002) A P3P Preference Exchange Language 1.0 (APPEL 1.0). http://www.w3.org/TR/P3P-preferences/
-
W3C (2002) A P3P Preference Exchange Language 1.0 (APPEL 1.0). http://www.w3.org/TR/P3P-preferences/
-
-
-
|