-
1
-
-
40949083391
-
-
Anind K Dey, Providing Architectural Support for Building Context-Aware Application: [Ph D dissertation], Atlanta, Georgia: College of Computing, Georgia Institute of Technology, 2000.
-
Anind K Dey, Providing Architectural Support for Building Context-Aware Application: [Ph D dissertation], Atlanta, Georgia: College of Computing, Georgia Institute of Technology, 2000.
-
-
-
-
2
-
-
38049062030
-
Privacy and Trust: The role of situational and dispositional variables in online disclosure
-
Dublin, May
-
Adam N. Joinson, Carina Paine, Ulf-Dietrich Reips, Buchanan, T., "Privacy and Trust: The role of situational and dispositional variables in online disclosure", Proceedings of Workshop 'Trust and Identity in Ambient Technologies' at Pervasive 2006: The 4th International Conference on Pervasive Computing, Dublin, May 2006.
-
(2006)
Proceedings of Workshop 'Trust and Identity in Ambient Technologies' at Pervasive 2006: The 4th International Conference on Pervasive Computing
-
-
Joinson, A.N.1
Paine, C.2
Ulf-Dietrich Reips, B.T.3
-
3
-
-
0037669727
-
-
Geographic Location/Privacy IETF Working Group, IETF Internet-Draft. March
-
Geographic Location/Privacy IETF Working Group. Geopriv requirements. IETF Internet-Draft. March 2003.
-
(2003)
Geopriv requirements
-
-
-
5
-
-
0030086382
-
-
R. S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E.Youman, Role-Based Access Control Models, IEEE Computer 29(2): 38-47, IEEE Press.
-
R. S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E.Youman, Role-Based Access Control Models, IEEE Computer 29(2): 38-47, IEEE Press.
-
-
-
-
7
-
-
0003144494
-
Rough sets: A tutorial
-
S.K. Pal and A. Skowron, editors, Springer-Verlag, Singapore
-
J. Komorowski, Z. Polkowski, L, Polkowski and A. Skowron, "Rough sets: a tutorial", In S.K. Pal and A. Skowron, editors, Rough-Fuzzy Hybridization: A New Method for Decision Making, Springer-Verlag, Singapore.
-
Rough-Fuzzy Hybridization: A New Method for Decision Making
-
-
Komorowski, J.1
Polkowski, Z.2
Polkowski, L.3
Skowron, A.4
-
8
-
-
40949083392
-
Call, calm: Enabling Caller and Callee to Collaborate
-
Elin Ronby Pederson, "Call, calm: Enabling Caller and Callee to Collaborate", In proceedings of CHI 2001, 2001.
-
(2001)
In proceedings of CHI 2001
-
-
Ronby Pederson, E.1
-
9
-
-
3042780572
-
Using the Experience Sampling Method to Evaluate Ubicomp Applications: The Human Experience
-
Consolvo, S. and M. Walker, Using the Experience Sampling Method to Evaluate Ubicomp Applications: The Human Experience, IEEE Pervasive Computing Mobile and Ubiquitous System, 2003.2(2):p.24-31.
-
(2003)
IEEE Pervasive Computing Mobile and Ubiquitous System
, vol.2
, Issue.2
, pp. 24-31
-
-
Consolvo, S.1
Walker, M.2
-
10
-
-
40949112689
-
-
http://rosetta.sourceforge.net/.
-
-
-
-
11
-
-
40949132147
-
Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems
-
3rd international conference on ubiquitous computing, Springer-Verlag
-
Marc Langheinrich, "Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems", In 3rd international conference on ubiquitous computing, Springer-Verlag LNCS.
-
LNCS
-
-
Langheinrich, M.1
-
12
-
-
84937411601
-
A privacy awareness for ubiquitous computing environments, UbiComp 2002, Springer
-
Marc Langheinrich, "A privacy awareness for ubiquitous computing environments", UbiComp 2002, Springer LNCS 2498, pp 237-245.
-
LNCS
, vol.2498
, pp. 237-245
-
-
Langheinrich, M.1
-
13
-
-
15744377850
-
Towards a users driven privacy control
-
Oct. 10-13, The Hague, The Netherlands
-
Amr Ali Eldin and René Wagenaar, "Towards a users driven privacy control", in the IEEE conference on Systems, Man, and Cybernetics 2004, Oct. 10-13, 2004, The Hague, The Netherlands.
-
(2004)
IEEE conference on Systems, Man, and Cybernetics
-
-
Ali Eldin, A.1
Wagenaar, R.2
-
14
-
-
33646814741
-
Extending Context Models for Privacy in Pervasive Computing Environments
-
Karen Henricksen, Ryan Wishart, Ted McFadden, Jadwiga Indulska, "Extending Context Models for Privacy in Pervasive Computing Environments", Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 20-24.
-
Third IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 20-24
-
-
Henricksen, K.1
Wishart, R.2
McFadden, T.3
Indulska, J.4
-
15
-
-
84937391117
-
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing
-
Sep 29, Oct 1, Goteborg, Sweden
-
Xiaodong Jiang, Jason I. Hong and James Landay, "Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing", In Proceedings of Fourth International Conference on Ubiquitous Computing (Ubicomp'2002), Sep 29 - Oct 1, 2002, Goteborg, Sweden.
-
(2002)
Proceedings of Fourth International Conference on Ubiquitous Computing (Ubicomp'2002)
-
-
Jiang, X.1
Hong, J.I.2
Landay, J.3
-
16
-
-
2442557513
-
Modeling Privacy Control in Context-aware Systems Using Decentralized Information Spaces
-
Xiaodong Jiang and Landay, J., Modeling Privacy Control in Context-aware Systems Using Decentralized Information Spaces, IEEE Pervasive Computing 1(3) (2002).
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.3
-
-
Jiang, X.1
Landay, J.2
-
17
-
-
38049050165
-
Managing Personal Information Disclosure in Ubiquitous Computing Environments
-
Jun. 1
-
S.Lederer, C.Beckmann, A. Dey, and J. Mankoff, "Managing Personal Information Disclosure in Ubiquitous Computing Environments", Intel Research, IRB-TR-03-015, Jun. 1, 2003.
-
(2003)
Intel Research, IRB-TR-03-015
-
-
Lederer, S.1
Beckmann, C.2
Dey, A.3
Mankoff, J.4
-
18
-
-
40949089576
-
-
Proceedings of the 21st International Conference on Distributed Computing Systems
-
Matthew J. Moyer, Mustaque Ahamad, "Generalized Role-Based Access Control", In Proceedings of the 21st International Conference on Distributed Computing Systems.
-
Generalized Role-Based Access Control
-
-
Moyer, M.J.1
Ahamad, M.2
|