메뉴 건너뛰기




Volumn HCI, Issue , 2008, Pages 195-203

Personal and social information management with OpnTag

Author keywords

Personal information management (PIM); Privacy; Social information management; Tagging

Indexed keywords

DESIGN PHILOSOPHY; NOTE TAKING; OPEN SOURCES; PERSONAL INFORMATION MANAGEMENT; SOCIAL CONTEXT; SOCIAL INFORMATION; SOCIAL-PERSONAL INFORMATION MANAGEMENT; TECHNICAL STRUCTURES; WEB APPLICATION;

EID: 55849152826     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (8)
  • 2
  • 3
    • 33745216882 scopus 로고    scopus 로고
    • From PIM to GIM: Personal information management in group contexts
    • January
    • Erickson, T., 2006. From PIM to GIM: personal information management in group contexts. In Communications of the ACM, January 2006
    • (2006) Communications of the ACM
    • Erickson, T.1
  • 5
    • 55849119771 scopus 로고    scopus 로고
    • Design guidelines for an information privacy management system for personal learning spaces
    • Honolulu, Hawaii, USA
    • Razavi, M. N., Iverson, L., 2006. Design guidelines for an information privacy management system for personal learning spaces. In Proceedings of e-learn 2006, Honolulu, Hawaii, USA
    • (2006) Proceedings of e-learn 2006
    • Razavi, M.N.1    Iverson, L.2
  • 7
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Sandhu, Ravi S., Coyne, Edward J., Feinstein, Hal L., & Youman, Charles E., 1996. Role-based access control models. In Computer. Volume 29, Number 2, pp 38-47.
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1    Coyne, E.J.2    Feinstein, H.L.3    Youman, C.E.4
  • 8
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): Models for active and enterpriseoriented authorization management
    • North-Holland
    • Thomas, R., Sandhu, R., 1997. Task-based authorization controls (TBAC): Models for active and enterpriseoriented authorization management. In Database Security XI: Status and Prospects, North-Holland.
    • (1997) Database Security XI: Status and Prospects
    • Thomas, R.1    Sandhu, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.