메뉴 건너뛰기




Volumn 9, Issue 6 SPEC.ISS., 2004, Pages 693-701

Data protection and data sharing in telematics

Author keywords

Automotive telematics; Data protection architecture; Privacy policies

Indexed keywords

COMPUTER ARCHITECTURE; CRYPTOGRAPHY; DATA FLOW ANALYSIS; DATA PRIVACY; DATA REDUCTION; DATA STORAGE EQUIPMENT;

EID: 4944265018     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1023/B:MONE.0000042507.74516.00     Document Type: Conference Paper
Times cited : (30)

References (27)
  • 3
    • 4944224032 scopus 로고    scopus 로고
    • AT&T, Privacy Minder (2002), http://www.research.att. com/projects/p3p/pm
    • (2002) AT&T, Privacy Minder
  • 4
    • 4944247047 scopus 로고    scopus 로고
    • Bastille Linux (2002), http://www.bastille-linux.org
    • (2002) Bastille Linux
  • 13
  • 18
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by design - Principles of privacy-aware ubiquitous systems
    • eds. G. Abowd, B. Brumitt and S. Shafer, Lecture Notes in Computer Science
    • M. Langheinrich, Privacy by design - principles of privacy-aware ubiquitous systems, in: Proceedings of the Ubicomp 2001, eds. G. Abowd, B. Brumitt and S. Shafer, Lecture Notes in Computer Science, Vol. 2201 (2001) pp. 273-291.
    • (2001) Proceedings of the Ubicomp 2001 , vol.2201 , pp. 273-291
    • Langheinrich, M.1
  • 20
    • 0032665338 scopus 로고    scopus 로고
    • Security issues related to mobile code and agent-based systems
    • R. Opplinger, Security issues related to mobile code and agent-based systems, Computer Communications 22(12) (1999) 1165-1170.
    • (1999) Computer Communications , vol.22 , Issue.12 , pp. 1165-1170
    • Opplinger, R.1
  • 25
    • 4944245783 scopus 로고    scopus 로고
    • TCG, Trusted Computing Group (2002), https://www. trustedcomputinggroup. org/home
    • (2002)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.