-
1
-
-
24744468399
-
Protection of privacy in pervasive computing environments
-
4-6 April
-
1-H.S.Cheng, D.Zhang, J.G. Tan, "Protection of Privacy in Pervasive Computing Environments", International Conference on Information Technolog, Coding and Computing, 4-6 April 2005, pp. 242-247.
-
(2005)
International Conference on Information Technolog, Coding and Computing
, pp. 242-247
-
-
Cheng, H.S.1
Zhang, D.2
Tan, J.G.3
-
2
-
-
2942524994
-
Location privacy in pervasive computing
-
Jan-Mar 003
-
A.R. Beresford, F. Stajano, "Location Privacy in Pervasive Computing", In Pervasive Computing, IEEE, Volume 2, Issue 1, Jan-Mar 003, pp. 46-55.
-
Pervasive Computing, IEEE
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
3
-
-
2942524994
-
Location privacy in pervasive computing
-
April-June
-
A.R. Beresford, F. Stajano, "Location Privacy in Pervasive Computing", In Pervasive Computing, IEEE, Volume 2, Issue 2, April-June 2003, pp. 40-46.
-
(2003)
Pervasive Computing, IEEE
, vol.2
, Issue.2
, pp. 40-46
-
-
Beresford, A.R.1
Stajano, F.2
-
4
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
Jan -Mar 2003
-
G Myles, A. Firday, N.Davies, "Preserving privacy in environments with location-based applications", In Pervasive Computing, IEEE Volume 2, Issue 1, Jan -Mar 2003,pp. 56-64.
-
Pervasive Computing, IEEE
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Firday, A.2
Davies, N.3
-
5
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
Jan- Mar
-
G. Myles, A. Friday, N.Davies, "Preserving privacy in environments with location-based applications", In Pervasive Computing, IEEE Volume 2, Issue 1, Jan- Mar 2003, pp. 56-64.
-
(2003)
Pervasive Computing, IEEE
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
7
-
-
2442446612
-
Towards security and privacy for pervasive computing
-
R. Campbell, J. Al-Muhtadi, P.Naldurg, G. Sampemane, M.D.Mikunas, "Towards Security and Privacy for Pervasive Computing", In Proceedings of International Symposium on Software Security, 2002.
-
(2002)
Proceedings of International Symposium on Software Security
-
-
Campbell, R.1
Al-Muhtadi, J.2
Naldurg, P.3
Sampemane, G.4
Mikunas, M.D.5
-
8
-
-
79958188778
-
A privacy awareness system for ubiquitos computing environments
-
Ubicomp
-
M. Langheinrich,"A Privacy Awareness System for Ubiquitos Computing Environments", Ubicomp, In Lecture Notes in Computer Science, volume2498, pp.72-74.
-
Lecture Notes in Computer Science
, vol.2498
, pp. 72-74
-
-
Langheinrich, M.1
-
9
-
-
33947288450
-
Supporting quality of privacy (QoP) in pervasive computing
-
26-30 Sep.
-
M. Tentori, J. Favela M.D. Rodriguez, V.M. Gonzalez, "Supporting Quality of Privacy (QoP) in Pervasive Computing",In the Proc. Of Sixth Mexican International Conference on Computer Science, 26-30 Sep. 2005, pp. 58-67.
-
(2005)
The Proc. of Sixth Mexican International Conference on Computer Science
, pp. 58-67
-
-
Tentori, M.1
Favela, J.2
Rodriguez, M.D.3
Gonzalez, V.M.4
-
10
-
-
70449450528
-
UPM: User-centered privacy model in pervasive computing systems
-
3-5 April
-
A. Dehghantanha, R. Mahmod, N. Udzir, "UPM: User-centered Privacy Model in Pervasive Computing Systems", In the Proc. Of International Conference on Future Computer and Communications, 3-5 April 2009, pp. 65-71.
-
(2009)
The Proc. of International Conference on Future Computer and Communications
, pp. 65-71
-
-
Dehghantanha, A.1
Mahmod, R.2
Udzir, N.3
-
11
-
-
19944372788
-
Keeping ubiquitous computing to yourself: A practical model for user control of privacy
-
Blaine, A. P., Adam, K., & Nuseibeh, B. (2004). "Keeping ubiquitous computing to yourself:A practical model for user control of privacy". In International Journal of Human-Computer Studies, 63(1-2):228-253.
-
(2004)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 228-253
-
-
Blaine, A.P.1
Adam, K.2
Nuseibeh, B.3
-
13
-
-
77954779264
-
-
The Platform for Privacy Preferences 1.1 (P3P1.1)
-
W3C. The Platform for Privacy Preferences 1.1 (P3P1.1). Working draft, World Wide Web Consortium, Feb 2006. www.w3c.org/P3P.
-
(2006)
Working Draft, World Wide Web Consortium, Feb
-
-
-
14
-
-
24944578141
-
-
W3C Member Submission, November
-
Paul Ashley, Santoshi Hada, Gunter Karjoth, Calvin Powers, and Matthias Schunter. Enterprise Privacy Authorization Langugae (EPAL 1.2). W3C Member Submission, www.w3c.org/Submission/EPAL, November 2003.
-
(2003)
Enterprise Privacy Authorization Langugae (EPAL 1.2)
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
15
-
-
0242624597
-
From privacy promises to privacy management: A new approach for enforcing privacy throughout an enterprise
-
ACM Press
-
Paul Ashley, Calvin Powers, and Matthias Schunter. "From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise". In Proceedings of the 2002 Workshop on New Security Paradigms, pages 43-50. ACM Press, 2002.
-
(2002)
Proceedings of the 2002 Workshop on New Security Paradigms
, pp. 43-50
-
-
Ashley, P.1
Powers, C.2
Schunter, M.3
-
17
-
-
0035790640
-
A logical framework for reasoning about access control models
-
New York, NY, USA. ACM Press
-
Elisa Bertino, Barbara Catania, Elena Ferrari, and Paolo Perlasca. "A logical framework for reasoning about access control models". In SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies, pages 41-52, New York, NY, USA, 2001. ACM Press.
-
(2001)
SACMAT '01: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 41-52
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
|