-
3
-
-
4944224032
-
-
AT&T, Privacy Minder (2002), http://www.research.att. com/projects/p3p/pm
-
(2002)
AT&T, Privacy Minder
-
-
-
4
-
-
4944247047
-
-
Bastille Linux (2002), http://www.bastille-linux.org
-
(2002)
Bastille Linux
-
-
-
5
-
-
0038684353
-
How to go shopping on the World Wide Web without having your privacy violated
-
K. Bohrer, D. Kesdogan, X. Liu, M. Podlaseck, E. Schonberg, M. Singh and S. Spraragen, How to go shopping on the World Wide Web without having your privacy violated, in: 4th International Conference on Electronic Commerce Research (2001).
-
(2001)
4th International Conference on Electronic Commerce Research
-
-
Bohrer, K.1
Kesdogan, D.2
Liu, X.3
Podlaseck, M.4
Schonberg, E.5
Singh, M.6
Spraragen, S.7
-
6
-
-
0038684353
-
Personal information management and distribution
-
K. Bohrer, X. Liu, D. Kesdogan, E. Schonberg, M. Singh and S. Spraragen, Personal information management and distribution, in: Proceedings of the 4th International Conference on Electronic Commerce Research (2001).
-
(2001)
Proceedings of the 4th International Conference on Electronic Commerce Research
-
-
Bohrer, K.1
Liu, X.2
Kesdogan, D.3
Schonberg, E.4
Singh, M.5
Spraragen, S.6
-
7
-
-
0035791053
-
Securing context-aware applications using environment roles
-
M. Covington, W. Long, S. Srinivasan, A. Dey, M. Ahamad and G. Abowd, Securing context-aware applications using environment roles, in: Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001) (2001).
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001)
-
-
Covington, M.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
11
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security 4(3) (2001) 224-274.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
18
-
-
84945556728
-
Privacy by design - Principles of privacy-aware ubiquitous systems
-
eds. G. Abowd, B. Brumitt and S. Shafer, Lecture Notes in Computer Science
-
M. Langheinrich, Privacy by design - principles of privacy-aware ubiquitous systems, in: Proceedings of the Ubicomp 2001, eds. G. Abowd, B. Brumitt and S. Shafer, Lecture Notes in Computer Science, Vol. 2201 (2001) pp. 273-291.
-
(2001)
Proceedings of the Ubicomp 2001
, vol.2201
, pp. 273-291
-
-
Langheinrich, M.1
-
20
-
-
0032665338
-
Security issues related to mobile code and agent-based systems
-
R. Opplinger, Security issues related to mobile code and agent-based systems, Computer Communications 22(12) (1999) 1165-1170.
-
(1999)
Computer Communications
, vol.22
, Issue.12
, pp. 1165-1170
-
-
Opplinger, R.1
-
25
-
-
4944245783
-
-
TCG, Trusted Computing Group (2002), https://www. trustedcomputinggroup. org/home
-
(2002)
-
-
|