-
2
-
-
67449088420
-
-
WROX Press
-
Matjaz, M., Nashi, N., Berry, C., Kunnumpurath, M., Carnell, J. and Romanosky, S., "J2EE Design Patterns Applied", WROX Press, 2002.
-
(2002)
J2EE Design Patterns Applied
-
-
Matjaz, M.1
Nashi, N.2
Berry, C.3
Kunnumpurath, M.4
Carnell, J.5
Romanosky, S.6
-
3
-
-
33750050331
-
-
Markus, M, Fernandez, E, Hybertson, D, Buschmann, F. and Sommerlad P, editors, Wiley Press
-
Markus, M., Fernandez, E., Hybertson, D., Buschmann, F. and Sommerlad P. (editors) "Security Patterns: Integrating Security and System Engineering", Wiley Press, 2006.
-
(2006)
Security Patterns: Integrating Security and System Engineering
-
-
-
5
-
-
33750490069
-
-
Prentice Hall
-
Steel, C., Nagappan, R. and Lai, R., "Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management", Prentice Hall, 2005.
-
(2005)
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
-
7
-
-
84868998841
-
Security Patterns and Security Standards - With Selected Security Patterns for Anonymity and Privacy
-
EuroPLoP
-
Schumacher, M., "Security Patterns and Security Standards - With Selected Security Patterns for Anonymity and Privacy", European Conference on Pattern Languages of Programs (EuroPLoP), 2002.
-
(2002)
European Conference on Pattern Languages of Programs
-
-
Schumacher, M.1
-
8
-
-
10044278069
-
Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing
-
Chung, E.S., Hong, J., Lin, J., Prabaker, M.K., Landay, J.A., and Liu, A., "Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing", In Proceedings of Designing Interactive Systems (DIS2004), 2004.
-
(2004)
Proceedings of Designing Interactive Systems (DIS2004)
-
-
Chung, E.S.1
Hong, J.2
Lin, J.3
Prabaker, M.K.4
Landay, J.A.5
Liu, A.6
-
10
-
-
0005078194
-
Informed consent online: A conceptual model and design principles
-
00-12-02. Seattle, WA: University of Washington, Department of Computer Science and Engineering
-
Friedman, B., Millett, L. and Felten, E., "Informed consent online: A conceptual model and design principles", UW CSE Technical Report 00-12-02. Seattle, WA: University of Washington, Department of Computer Science and Engineering, 2000.
-
(2000)
UW CSE Technical Report
-
-
Friedman, B.1
Millett, L.2
Felten, E.3
-
11
-
-
84948688880
-
Informed consent in the Mozilla browser: Implementing Value-Sensitive Design
-
Friedman, B., Howe, D.C. and Felten, E., "Informed consent in the Mozilla browser: Implementing Value-Sensitive Design", In Proceedings of the Thirty-Fifth Annual Hawai'i International Conference on System Sciences, 2002.
-
(2002)
Proceedings of the Thirty-Fifth Annual Hawai'i International Conference on System Sciences
-
-
Friedman, B.1
Howe, D.C.2
Felten, E.3
-
12
-
-
84972531331
-
Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future
-
Duncan, G. and Pearson, R., "Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future", Statistical Science, Vol. 6, No. 3, pp. 219-239, 1991.
-
(1991)
Statistical Science
, vol.6
, Issue.3
, pp. 219-239
-
-
Duncan, G.1
Pearson, R.2
-
13
-
-
0004101993
-
-
John Wiley & Sons
-
Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P. and Stal, P., "Pattern-Oriented Software Architecture", John Wiley & Sons, 1996.
-
(1996)
Pattern-Oriented Software Architecture
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerlad, P.4
Stal, P.5
-
14
-
-
3242812017
-
Privacy in Electronic Commerce and the Economics of Immediate Gratification
-
New York, NY: ACM Press
-
Acquisti, A., "Privacy in Electronic Commerce and the Economics of Immediate Gratification", In Proceedings of the ACM Electronic Commerce Conference (EC 04). New York, NY: ACM Press, 21-29, 2004.
-
(2004)
Proceedings of the ACM Electronic Commerce Conference (EC 04)
, pp. 21-29
-
-
Acquisti, A.1
-
15
-
-
67449104110
-
-
Cranor, L.F., Web Privacy with P3P, O'Reilly Media Inc., 2002.
-
Cranor, L.F., "Web Privacy with P3P", O'Reilly Media Inc., 2002.
-
-
-
-
16
-
-
38149024615
-
-
University of California Berkeley
-
Jiang, X., Hong, J. and Landay, J., "Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing", University of California Berkeley, 2002.
-
(2002)
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing
-
-
Jiang, X.1
Hong, J.2
Landay, J.3
-
17
-
-
0005063385
-
Onion Routing for Anonymous and Private Internet Connections
-
February
-
Goldschlag, D., Reed, M., and Syverson, P., "Onion Routing for Anonymous and Private Internet Connections", Communications of the ACM, vol. 42, num. 2, February 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
19
-
-
67449100896
-
-
Carnegie Mellon University
-
Engelman, S., Cranor, L.F. and Chowdury, A., "An analysis of P3P-Enabled web sites among Top-20 Search Results", Carnegie Mellon University, 2005.
-
(2005)
An analysis of P3P-Enabled web sites among Top-20 Search Results
-
-
Engelman, S.1
Cranor, L.F.2
Chowdury, A.3
-
20
-
-
40949123197
-
-
Digital Technology Center, University of Minnesota
-
Odlyzko, A., "Privacy, Economics, and Price Discrimination" Digital Technology Center, University of Minnesota, 2003.
-
(2003)
Privacy, Economics, and Price Discrimination
-
-
Odlyzko, A.1
-
21
-
-
67449092984
-
Beyond Concern: Understanding Net Users' Attitudes About Online Privacy
-
Cranor, L.F., Reagle, J. and Ackerman, M., "Beyond Concern: Understanding Net Users' Attitudes About Online Privacy", ATamp;T Labs, 1999.
-
(1999)
ATamp;T Labs
-
-
Cranor, L.F.1
Reagle, J.2
Ackerman, M.3
-
23
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
Chaum, D., "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communications of the ACM, v. 24, n. 2, pp. 84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
24
-
-
85084161366
-
Tor: The Second-Generation Onion Router
-
Dingledine, R., Mathewson, N., and Syverson, P., "Tor: The Second-Generation Onion Router", In Proceedings of the 13th USENIX Security Symposium, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
28
-
-
85005305538
-
The Market for Lemons: Quality uncertainty and the Market Mechanism
-
Akerlof, G., "The Market for Lemons: Quality uncertainty and the Market Mechanism", Quarterly Journal of Economics, 84(3), pp. 488-500, 1970.
-
(1970)
Quarterly Journal of Economics
, vol.84
, Issue.3
, pp. 488-500
-
-
Akerlof, G.1
-
29
-
-
42449146154
-
Privacy-Aware Network Client Pattern
-
Sadicoff, M., Larrondo-Petrie, M., and Fernandez, E., "Privacy-Aware Network Client Pattern", Proceedings of the Pattern Languages of Programs, 2005.
-
(2005)
Proceedings of the Pattern Languages of Programs
-
-
Sadicoff, M.1
Larrondo-Petrie, M.2
Fernandez, E.3
|