메뉴 건너뛰기




Volumn , Issue , 2011, Pages 966-973

An approach to community-oriented email privacy

Author keywords

Community tagging; Email; Formal modeling; Group collaboration; Privacy protection

Indexed keywords

COMMUNITY TAGGING; FORMAL MODELING; GROUP COLLABORATION; PRIVACY PRESERVING; PRIVACY PROTECTION; STATE TRANSITION SYSTEMS;

EID: 84856203506     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PASSAT/SocialCom.2011.96     Document Type: Conference Paper
Times cited : (5)

References (25)
  • 2
    • 85143190875 scopus 로고    scopus 로고
    • We're in it together: Interpersonal management of disclosure in social network services
    • Vancouver, BC, Canada
    • A. Lampinen, et al., "We're in it together: interpersonal management of disclosure in social network services, " Proc. of the 2011 annual conference on Human factors in computing systems, Vancouver, BC, Canada, 2011.
    • (2011) Proc. of the 2011 Annual Conference on Human Factors in Computing Systems
    • Lampinen, A.1
  • 5
    • 19944410216 scopus 로고    scopus 로고
    • Why HCI research in privacy and security is critical now
    • DOI 10.1016/j.ijhcs.2005.04.016, PII S1071581905000716, HCI Research in Privacy and Security
    • C.-M. Karat, et al., "Editorial: why HCI research in privacy and security is critical now, " International Journal of Human-Computer Studies, vol. 63, pp. 1-4, 2005. (Pubitemid 40753490)
    • (2005) International Journal of Human Computer Studies , vol.63 , Issue.1-2 , pp. 1-4
    • Karat, C.-M.1    Karat, J.2    Brodie, C.3
  • 7
    • 10844259286 scopus 로고    scopus 로고
    • Unpacking "Privacy" for a networked world
    • Ft. Lauderdale, Florida, USA
    • L. Palen, and Dourish, P., "Unpacking "Privacy" for a Networked World, " Proc. of the CHI'03, Ft. Lauderdale, Florida, USA, 2003.
    • (2003) Proc. of the CHI'03
    • Palen, L.1    Dourish, P.2
  • 8
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • H. Nissenbaum, "Privacy as Contextual Integrity, " Washington Law Review, vol. 79, pp. 119-158, 2004.
    • (2004) Washington Law Review , vol.79 , pp. 119-158
    • Nissenbaum, H.1
  • 10
    • 33845422335 scopus 로고    scopus 로고
    • What we talk about when we talk about context
    • P. Dourish, "What we talk about when we talk about context, " Personal Ubiquitous Comput., vol. 8, pp. 19- 30, 2004.
    • (2004) Personal Ubiquitous Comput. , vol.8 , pp. 19-30
    • Dourish, P.1
  • 11
    • 34547176767 scopus 로고    scopus 로고
    • Revisiting Whittaker & Sidner's "email overload" ten years later
    • DOI 10.1145/1180875.1180922, Proceedings of the 20th Anniversary ACM Conference on Computer Supported Cooperative Work, CSCW 2006
    • D. Fisher, et al., "Revisiting Whittaker & Sidner's "email overload" ten years later, " in Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work (CSCW'06), ed. Banff, Alberta, Canada: ACM, 2006, pp. 309-312. (Pubitemid 47112419)
    • (2006) Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW , pp. 309-312
    • Fisher, D.1    Brush, A.J.2    Gleave, E.3    Smith, M.A.4
  • 15
    • 84856186485 scopus 로고    scopus 로고
    • Introduction to P3P
    • ed: O'Reilly and Associates
    • L. F. Cranor, "Introduction to P3P, " in Web Privacy with P3P, ed: O'Reilly and Associates, 2002, pp. 3-11.
    • (2002) Web Privacy with P3P , pp. 3-11
    • Cranor, L.F.1
  • 16
    • 33750337486 scopus 로고    scopus 로고
    • Developing privacy guidelines for social location disclosure applications and services
    • Pittsburgh, Pennsylvania
    • G. Iachello, et al., "Developing privacy guidelines for social location disclosure applications and services, " Proc. of the 2005 Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, 2005.
    • (2005) Proc. of the 2005 Symposium on Usable Privacy and Security
    • Iachello, G.1
  • 17
    • 78651407156 scopus 로고    scopus 로고
    • Attribute-based messaging: Access control and confidentiality
    • R. Bobba, et al., "Attribute-Based Messaging: Access Control and Confidentiality, " ACM Trans. Inf. Syst. Secur., vol. 13, pp. 1-35, 2010.
    • (2010) ACM Trans. Inf. Syst. Secur. , vol.13 , pp. 1-35
    • Bobba, R.1
  • 20
    • 84885062887 scopus 로고    scopus 로고
    • Collaborative privacy - A community-based privacy infrastructure
    • D. Gritzalis and J. Lopez, Eds. ed: Springer Boston
    • J. Kolter, et al., "Collaborative Privacy - A Community-Based Privacy Infrastructure, " in Emerging Challenges for Security, Privacy and Trust. vol. 297, D. Gritzalis and J. Lopez, Eds., ed: Springer Boston, 2009, pp. 226-236.
    • (2009) Emerging Challenges for Security, Privacy and Trust , vol.297 , pp. 226-236
    • Kolter, J.1
  • 21
    • 77955711162 scopus 로고    scopus 로고
    • Collaborative privacy management
    • July 2010
    • J. Kolter, et al., "Collaborative privacy management, " Computers & Security, vol. 29, pp. 580-591, July 2010 2010.
    • (2010) Computers & Security , vol.29 , pp. 580-591
    • Kolter, J.1
  • 25
    • 33751063543 scopus 로고    scopus 로고
    • Privacy and contextual integrity: Framework and applications
    • Oakland, California
    • A. Barth, et al., "Privacy and Contextual Integrity: Framework and Applications, " in 27th IEEE Symposium on Security and Privacy, Oakland, California, 2006, p. 15.
    • (2006) 27th IEEE Symposium on Security and Privacy , pp. 15
    • Barth, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.