-
1
-
-
2442446612
-
Towards Security and Privacy for Pervasive Computing
-
Tokyo, Japan
-
R. Campbell, J. Al-Muhtadi, P. Naldurg, G. Sampemane, and M, D. Mickunas, "Towards Security and Privacy for Pervasive Computing", presented at International Symposium on Software Security, Tokyo, Japan, 2002.
-
(2002)
presented at International Symposium on Software Security
-
-
Campbell, R.1
Al-Muhtadi, J.2
Naldurg, P.3
Sampemane, G.4
Mickunas, M.D.5
-
2
-
-
33746862956
-
-
E. Dyson, Privacy Protection: Time to Think and Act Locally and Globally, First Monday, July, 2006.
-
E. Dyson, "Privacy Protection: Time to Think and Act Locally and Globally", First Monday, vol. July, 2006.
-
-
-
-
3
-
-
84945556728
-
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
-
Ubicomp 2001 Proceedings, of
-
M. Langheinrich, "Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems", in Ubicomp 2001 Proceedings, volume 2201 of Lecture Notes in Computer Science, 2001, pp. 273-291.
-
(2001)
Lecture Notes in Computer Science
, vol.2201
, pp. 273-291
-
-
Langheinrich, M.1
-
4
-
-
2942524994
-
Location Privacy in Pervasive Computing
-
January-March, pp
-
A. Beresford and F. Stajano, "Location Privacy in Pervasive Computing", IEEE Pervasive Computing, vol. January-March, pp. 47-55, 2003.
-
(2003)
IEEE Pervasive Computing, vol
, pp. 47-55
-
-
Beresford, A.1
Stajano, F.2
-
5
-
-
1642286258
-
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
-
New York, NY
-
M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking", presented at 1st international conference on Mobile systems, applications and services, New York, NY, 2003.
-
(2003)
presented at 1st international conference on Mobile systems, applications and services
-
-
Gruteser, M.1
Grunwald, D.2
-
9
-
-
4544259863
-
An Architecture for Privacy-Sensitive Ubiquitous Computing
-
Boston, MA
-
J. Hong and J. Landay, "An Architecture for Privacy-Sensitive Ubiquitous Computing", presented at 2nd international conference on Mobile systems, applications, and services, Boston, MA, 2004.
-
(2004)
presented at 2nd international conference on Mobile systems, applications, and services
-
-
Hong, J.1
Landay, J.2
-
11
-
-
0013243382
-
The Platform for Privacy Preferences 1.1 (P3P1.1) Specification
-
W3C, November
-
L. Cranor, B. Dobbs, S. Egelman, G. Hogben, J. Humphrey, M. Langheinrich, M. Marchiori, M. Presler-Marshall, J. Reagle, M. Schunter, D. A. Stampley, and R. Wenning, "The Platform for Privacy Preferences 1.1 (P3P1.1) Specification", W3C, November 2006.
-
(2006)
-
-
Cranor, L.1
Dobbs, B.2
Egelman, S.3
Hogben, G.4
Humphrey, J.5
Langheinrich, M.6
Marchiori, M.7
Presler-Marshall, M.8
Reagle, J.9
Schunter, M.10
Stampley, D.A.11
Wenning, R.12
-
12
-
-
0038007758
-
Designing a Social Protocol: Lessons Learned from the Platform for Privacy Preferences Project
-
D. Waterman, Ed, Mahwah: Lawrence Erlbaum Associates
-
L. F. Cranor and J. Reagle, "Designing a Social Protocol: Lessons Learned from the Platform for Privacy Preferences Project", in Telephony, the Internet, and the Meda, D. Waterman, Ed.: Mahwah: Lawrence Erlbaum Associates, 1998.
-
(1998)
Telephony, the Internet, and the Meda
-
-
Cranor, L.F.1
Reagle, J.2
-
13
-
-
7644223159
-
Maintaining privacy in pervasive computing enabling acceptance of sensor-based services
-
A. Soppera and T. Burbridge, "Maintaining privacy in pervasive computing enabling acceptance of sensor-based services", BT Technology Journal, vol. 22, pp. 106-118, 2004.
-
(2004)
BT Technology Journal
, vol.22
, pp. 106-118
-
-
Soppera, A.1
Burbridge, T.2
-
14
-
-
41949093741
-
-
December, 5 2007
-
B. Ferg, B. Fitzpatrick, C. Howells, D. Recordon, D. Hardt, D. Reed, H. Granqvist, J. Ernst, J. Bufu, J. Hoyt, K. Turner, M. Scurtescu, M. Atkins, and M. Glover, "OpeniD Authentication 2.0", http://openid.net/specs/ openid-authentication-2-0.html, December, 5 2007.
-
OpeniD Authentication 2.0
-
-
Ferg, B.1
Fitzpatrick, B.2
Howells, C.3
Recordon, D.4
Hardt, D.5
Reed, D.6
Granqvist, H.7
Ernst, J.8
Bufu, J.9
Hoyt, J.10
Turner, K.11
Scurtescu, M.12
Atkins, M.13
Glover, M.14
-
15
-
-
38949134629
-
Security Assertion Markup Language (SAML) V2.0 Technical Overview
-
OASIS Open, 9 October
-
N. Ragouzis, J. Hughes, R. Philpott, and E. Maler, "Security Assertion Markup Language (SAML) V2.0 Technical Overview", OASIS Open, http://www.oasis.open.org/committees/documents.php?wg-abbrev=security, 9 October 2006.
-
(2006)
-
-
Ragouzis, N.1
Hughes, J.2
Philpott, R.3
Maler, E.4
-
16
-
-
33745459183
-
Establishing and Protecting Digital Identity in Federation Systems
-
A. Bhargav-Spantzel, A. C. Squicciarini, and E. Bertino, "Establishing and Protecting Digital Identity in Federation Systems", Journal of Computer Security, vol. 14, pp. 269-300, 2006.
-
(2006)
Journal of Computer Security
, vol.14
, pp. 269-300
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.C.2
Bertino, E.3
-
17
-
-
0036871183
-
Negotiating Trust on the Web
-
November-December, pp
-
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu, "Negotiating Trust on the Web", IEEE Internet Computing, vol. November-December, pp. 30-37, 2002.
-
(2002)
IEEE Internet Computing, vol
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
19
-
-
34047093851
-
Trust Negotiation in Identity Management
-
March/April, pp
-
A. Bhargav-Spantzel, A. Squicciarini, and E. Bertino, "Trust Negotiation in Identity Management", IEEE SECURITY & PRIVACY, vol. March/April, pp. 55-63, 2007.
-
(2007)
IEEE SECURITY & PRIVACY, vol
, pp. 55-63
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.2
Bertino, E.3
-
20
-
-
35348820605
-
Private and Secure Service Discovery via Progressive and Probabilistic Exposure
-
F. Zhu, W. Zhu, M. Mutka, and L. Ni, "Private and Secure Service Discovery via Progressive and Probabilistic Exposure", IEEE Transactions on Parallel and Distributed Systems, vol. 18, pp. 1565-1577, 2007.
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, pp. 1565-1577
-
-
Zhu, F.1
Zhu, W.2
Mutka, M.3
Ni, L.4
|