-
2
-
-
84860716220
-
-
IdM Policy Audit System. http://www.isoc.org/projects/idm-policy-audit- system.
-
-
-
-
3
-
-
84860716217
-
-
P3P 1.1 Specification. http://www.w3.org/TR/P3P11/.
-
-
-
-
4
-
-
84860768087
-
-
Xbox Kinect. http://www.xbox.com/en-US/kinect.
-
-
-
-
7
-
-
52149093804
-
Sentry@Home - Leveraging the smart home for privacy in pervasive computing
-
S. A. Bagues, A. Zeidler, F. Valdivielso, and I. R. Matias. Sentry@Home - Leveraging the Smart Home for Privacy in Pervasive Computing. International Journal of Smart Home, 1, 2007.
-
(2007)
International Journal of Smart Home
, vol.1
-
-
Bagues, S.A.1
Zeidler, A.2
Valdivielso, F.3
Matias, I.R.4
-
8
-
-
59249102694
-
Attested append-only memory: Making adversaries stick to their word
-
B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Attested Append-Only Memory: Making Adversaries Stick to Their Word. In SOSP, 2007.
-
(2007)
SOSP
-
-
Chun, B.-G.1
Maniatis, P.2
Shenker, S.3
Kubiatowicz, J.4
-
9
-
-
78650021719
-
The wi-fi privacy ticker: Improving awareness & control of personal information exposure on wi-fi
-
S. Consolvo, J. Jung, B. Greenstein, P. Powledge, G. Maganis, and D. Avrahami. The Wi-Fi Privacy Ticker: Improving Awareness & Control of Personal Information Exposure on Wi-Fi. In Ubicomp, 2010.
-
(2010)
Ubicomp
-
-
Consolvo, S.1
Jung, J.2
Greenstein, B.3
Powledge, P.4
Maganis, G.5
Avrahami, D.6
-
10
-
-
84868365803
-
Efficient data structures for tamper-evident logging
-
S. A. Crosby and D. S. Wallach. Efficient Data Structures for Tamper-Evident Logging. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Crosby, S.A.1
Wallach, D.S.2
-
11
-
-
79959868798
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In OSDI, 2010.
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
12
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
J. Hong and J. Landay. An Architecture for Privacy-Sensitive Ubiquitous Computing. In MobiSys, 2004.
-
(2004)
MobiSys
-
-
Hong, J.1
Landay, J.2
-
13
-
-
70349276980
-
Privacy oracle: A system for finding application leaks with black box differential testing
-
J. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis, and T. Kohno. Privacy Oracle: a System for Finding Application Leaks with Black Box Differential Testing. In CCS, 2008.
-
(2008)
CCS
-
-
Jung, J.1
Sheth, A.2
Greenstein, B.3
Wetherall, D.4
Maganis, G.5
Kohno, T.6
-
16
-
-
77953972803
-
Standardizing privacy notices: An online study of the nutrition label approach
-
P. G. Kelley, L. Cesca, J. Bresee, and L. F. Cranor. Standardizing Privacy Notices: an Online Study of the Nutrition Label Approach. In CHI, 2010.
-
(2010)
CHI
-
-
Kelley, P.G.1
Cesca, L.2
Bresee, J.3
Cranor, L.F.4
-
17
-
-
0142229016
-
Privacy by design - Principles of privacy-aware ubiquitous systems
-
M. Langheinrich. Privacy By Design - Principles of Privacy-Aware Ubiquitous Systems. In Ubicomp, 2001.
-
(2001)
Ubicomp
-
-
Langheinrich, M.1
-
18
-
-
2442539759
-
A privacy awareness system for ubiquitous computing environments
-
M. Langheinrich. A Privacy Awareness System for Ubiquitous Computing Environments. In Ubicomp, 2002.
-
(2002)
Ubicomp
-
-
Langheinrich, M.1
-
19
-
-
77955186544
-
TRUSTVISOR: Efficient TCB reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In IEEE Symposium on Security and Privacy, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
20
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An Execution Infrastructure for TCB Minimization. In EuroSys, 2008.
-
(2008)
EuroSys
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
21
-
-
70349693912
-
Bokode: Imperceptible visual tags for camera-based interaction from a distance
-
A. Mohan, G. Woo, S. Hiura, Q. Smithwick, and R. Raskar. Bokode: Imperceptible Visual Tags for Camera-based Interaction from a Distance. In ACM SIGGRAPH, 2009.
-
(2009)
ACM Siggraph
-
-
Mohan, A.1
Woo, G.2
Hiura, S.3
Smithwick, Q.4
Raskar, R.5
-
22
-
-
78149304394
-
PixNet: LCD-camera Pairs as communication links
-
S. D. Perli, N. Ahmed, and D. Katabi. PixNet: LCD-camera Pairs as Communication Links. In ACM SIGCOMM, 2010.
-
(2010)
ACM Sigcomm
-
-
Perli, S.D.1
Ahmed, N.2
Katabi, D.3
-
23
-
-
85021950441
-
Secure audit logs to support computer forensics
-
B. Schneier and J. Kelsey. Secure Audit Logs to Support Computer Forensics. In ACM TISSEC, 1999.
-
(1999)
ACM TISSEC
-
-
Schneier, B.1
Kelsey, J.2
|