-
2
-
-
79551602978
-
The semantic web
-
Berners-Lee, T., Hendler, J., Lassila, O.: The semantic web. Scientific America, 34-43 (2001)
-
(2001)
Scientific America
, vol.34-43
-
-
Berners-Lee, T.1
Hendler, J.2
Lassila, O.3
-
3
-
-
39549119389
-
Is semantic web technology taking the wrong turn?
-
Bussler, C.: Is semantic web technology taking the wrong turn? Internet Computing, IEEE 12, 75-79 (2008)
-
(2008)
Internet Computing
, vol.IEEE 12
, pp. 75-79
-
-
Bussler, C.1
-
4
-
-
67650786435
-
-
Data protection in the european union, citizens' perceptions, The Gallup Organization
-
Data protection in the european union - citizens' perceptions. Flash Eurobarometer 225, The Gallup Organization (2008)
-
(2008)
Flash Eurobarometer
, vol.225
-
-
-
5
-
-
71849110778
-
-
Data protection. Special Eurobarometer 192, European Opinion Research Group EEIG (2003)
-
Data protection. Special Eurobarometer 192, European Opinion Research Group EEIG (2003)
-
-
-
-
6
-
-
0002186644
-
Privacy-enhancing technologies: Typology, critique, vision
-
Agre, P, Rotenberg, M, eds, MIT Press, Cambridge
-
Burkert, H.: Privacy-enhancing technologies: typology, critique, vision. In: Agre, P., Rotenberg, M. (eds.) Technology and Privacy: The New Landscape, pp. 125-142. MIT Press, Cambridge (1997)
-
(1997)
Technology and Privacy: The New Landscape
, pp. 125-142
-
-
Burkert, H.1
-
7
-
-
0030644696
-
Privacy-enhancing technologies for the internet
-
IEEE Computer Society Press, Los Alamitos
-
Goldberg, I., Wagner, D., Brewer, E.: Privacy-enhancing technologies for the internet. In: Proc. of 42nd IEEE Spring COMPCON. IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
Proc. of 42nd IEEE Spring COMPCON
-
-
Goldberg, I.1
Wagner, D.2
Brewer, E.3
-
8
-
-
71849111010
-
-
Cranor, L., Langheinrich, M., Marchiori, M., Reagle, J.: The platform for privacy preferences 1.0 (p3p1.0) specification. W3C Recommendation (2002)
-
Cranor, L., Langheinrich, M., Marchiori, M., Reagle, J.: The platform for privacy preferences 1.0 (p3p1.0) specification. W3C Recommendation (2002)
-
-
-
-
9
-
-
0005415045
-
Pretty poor privacy: An assessment of p3p and internet privacy
-
EPIC:, Technical report, Electronic Privacy Information Center
-
EPIC: Pretty poor privacy: An assessment of p3p and internet privacy. Technical report, Electronic Privacy Information Center (2000)
-
(2000)
-
-
-
10
-
-
0242276201
-
-
Kagal, L., Finin, T., Joshi, A.: A policy based approach to security for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, 2870, pp. 402-418. Springer, Heidelberg (2003)
-
Kagal, L., Finin, T., Joshi, A.: A policy based approach to security for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 402-418. Springer, Heidelberg (2003)
-
-
-
-
12
-
-
84944048132
-
-
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, 1995, pp. 18-38. Springer, Heidelberg (2001)
-
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18-38. Springer, Heidelberg (2001)
-
-
-
-
13
-
-
34748888266
-
Privacy in the semantic web: What policy languages have to offer
-
Duma, C., Herzog, A., Shahmehri, N.: Privacy in the semantic web: What policy languages have to offer. In: Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007, pp. 109-118 (2007)
-
(2007)
Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY
, pp. 109-118
-
-
Duma, C.1
Herzog, A.2
Shahmehri, N.3
-
15
-
-
71849083876
-
-
EU: Directive 2002/58/ec of the european parliament and of the council concerning the processing of personal data and the protection of privacy in the electronic communications sector. Official Journal of the European Communities (2002)
-
EU: Directive 2002/58/ec of the european parliament and of the council concerning the processing of personal data and the protection of privacy in the electronic communications sector. Official Journal of the European Communities (2002)
-
-
-
-
16
-
-
71849113326
-
-
EU: Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities (1995)
-
EU: Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities (1995)
-
-
-
-
17
-
-
34548525381
-
A middleware architecture for privacy protection
-
Lioudakis, G.V., Koutsoloukas, E.A., Dellas, N.L., Tselikas, N., Kapellaki, S., Prezerakos, G.N., Kaklamani, D.I., Venieris, I.S.: A middleware architecture for privacy protection. Computer Networks 51, 4679-4696 (2007)
-
(2007)
Computer Networks
, vol.51
, pp. 4679-4696
-
-
Lioudakis, G.V.1
Koutsoloukas, E.A.2
Dellas, N.L.3
Tselikas, N.4
Kapellaki, S.5
Prezerakos, G.N.6
Kaklamani, D.I.7
Venieris, I.S.8
-
19
-
-
33747846186
-
Client-side access control enforcement using trusted computing and PEI models
-
Sandhu, R., Zhang, X., Ranganathan, K., Covington, M.J.: Client-side access control enforcement using trusted computing and PEI models. Journal of High Speed Networks 15, 229-245 (2006)
-
(2006)
Journal of High Speed Networks
, vol.15
, pp. 229-245
-
-
Sandhu, R.1
Zhang, X.2
Ranganathan, K.3
Covington, M.J.4
-
20
-
-
0041291986
-
-
RFC 3280
-
Housley, R., Polk, W., Ford,W., Solo, D.: RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor (2002)
-
(2002)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
21
-
-
40949142231
-
Privacy management system using social networking
-
Korba, L, ed, Man and Cybernetics, ISIC, pp
-
Song, R., Korba, L., Yee, G.: Privacy management system using social networking. In: Korba, L. (ed.) IEEE International Conference on Systems, Man and Cybernetics, ISIC, pp. 3327-3332 (2007)
-
(2007)
IEEE International Conference on Systems
, pp. 3327-3332
-
-
Song, R.1
Korba, L.2
Yee, G.3
-
22
-
-
67650841852
-
A note on Trust-Enhanced security
-
IEEE
-
Varadharajan, V.: A note on Trust-Enhanced security. Security & Privacy, IEEE 7, 57-59 (2009)
-
(2009)
Security & Privacy
, vol.7
, pp. 57-59
-
-
Varadharajan, V.1
-
23
-
-
34249811174
-
A survey of trust in computer science and the semantic web
-
Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web 5, 58-71 (2007)
-
(2007)
Web Semantics: Science, Services and Agents on the World Wide Web
, vol.5
, pp. 58-71
-
-
Artz, D.1
Gil, Y.2
-
24
-
-
0042495505
-
An integrative model of organizational trust
-
Mayer, R., Davis, J., Schoorman, F.: An integrative model of organizational trust. Academy of Management Review 2, 709-734 (1995)
-
(1995)
Academy of Management Review
, vol.2
, pp. 709-734
-
-
Mayer, R.1
Davis, J.2
Schoorman, F.3
-
25
-
-
0032371080
-
Straining for shared meaning in organization science: Problems of trust and distrust
-
Bigley, G., Pearce, J.: Straining for shared meaning in organization science: Problems of trust and distrust. Academy of Management Review 23, 405-421 (1998)
-
(1998)
Academy of Management Review
, vol.23
, pp. 405-421
-
-
Bigley, G.1
Pearce, J.2
-
26
-
-
0003839495
-
-
PhD thesis, Department of Comuting Science and Mathematics, University of Sterling
-
Marsh, S.P.: Formalizing Trust as a Computational Concept. PhD thesis, Department of Comuting Science and Mathematics, University of Sterling (1994)
-
(1994)
Formalizing Trust as a Computational Concept
-
-
Marsh, S.P.1
-
27
-
-
33750931980
-
-
Conrad, M., French, T., Huang, W., Maple, C.: A lightweight model of trust propagation in a multi-client network environment: to what extent does experience matter? In: The First International Conference on Availability, Reliability and Security, ARES 2006, 6 p. (2006)
-
Conrad, M., French, T., Huang, W., Maple, C.: A lightweight model of trust propagation in a multi-client network environment: to what extent does experience matter? In: The First International Conference on Availability, Reliability and Security, ARES 2006, 6 p. (2006)
-
-
-
-
29
-
-
22944435846
-
-
Golbeck, J., Hendler, J.: Accuracy of metrics for inferring trust and reputation in semantic web-based social networks. In: Motta, E., Shadbolt, N.R., Stutt, A., Gibbins, N. (eds.) EKAW 2004. LNCS (LNAI), 3257, pp. 116-131. Springer, Heidelberg (2004)
-
Golbeck, J., Hendler, J.: Accuracy of metrics for inferring trust and reputation in semantic web-based social networks. In: Motta, E., Shadbolt, N.R., Stutt, A., Gibbins, N. (eds.) EKAW 2004. LNCS (LNAI), vol. 3257, pp. 116-131. Springer, Heidelberg (2004)
-
-
-
-
30
-
-
19944395899
-
Propagation of trust and distrust
-
ACM, New York
-
Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: WWW 2004: Proceedings of the 13th international conference on World Wide Web, pp. 403-412. ACM, New York (2004)
-
(2004)
WWW 2004: Proceedings of the 13th international conference on World Wide Web
, pp. 403-412
-
-
Guha, R.1
Kumar, R.2
Raghavan, P.3
Tomkins, A.4
-
32
-
-
27844462024
-
Why have public key infrastructures failed so far?
-
Lopez, J., Oppliger, R., Pernul, G.: Why have public key infrastructures failed so far? Internet Research 15, 544-556 (2005)
-
(2005)
Internet Research
, vol.15
, pp. 544-556
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
|