메뉴 건너뛰기




Volumn 8, Issue 6, 2004, Pages 430-439

Privacy in pervasive environments: Next generation labeling protocols

Author keywords

Labeling protocols; P3P; Pervasive environments; Platform for privacy preferences; Privacy; Ubiquitous computing

Indexed keywords

DATA PRIVACY; UBIQUITOUS COMPUTING;

EID: 84900515472     PISSN: 16174909     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00779-004-0305-8     Document Type: Article
Times cited : (73)

References (32)
  • 1
    • 0034396278 scopus 로고    scopus 로고
    • Protecting privacy online: Is self-regulation working?
    • Culnan MJ (2000) Protecting privacy online: is self-regulation working? J Public Policy Market 19(1):20-26
    • (2000) J Public Policy Market , vol.19 , Issue.1 , pp. 20-26
    • Culnan, M.J.1
  • 3
    • 84900498777 scopus 로고    scopus 로고
    • Privacy by design
    • Fisher S (2001) Privacy by design. Info World 23(27):20-22
    • (2001) Info World , vol.23 , Issue.27 , pp. 20-22
    • Fisher, S.1
  • 5
    • 0033464665 scopus 로고    scopus 로고
    • Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation
    • Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ Sci 10(1):104-115
    • (1999) Organ Sci , vol.10 , Issue.1 , pp. 104-115
    • Culnan, M.J.1    Armstrong, P.K.2
  • 6
    • 0010932017 scopus 로고    scopus 로고
    • Re-engineering the right to privacy: How privacy has been transformed from a right to a commodity
    • Agre PE, Rotenberg M (eds) MIT Press, Cambridge, Massachusetts
    • Davies SG (1997) Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity. In: Agre PE, Rotenberg M (eds) Technology and privacy: the new landscape. MIT Press, Cambridge, Massachusetts
    • (1997) Technology and Privacy: The New Landscape
    • Davies, S.G.1
  • 9
    • 0000981743 scopus 로고    scopus 로고
    • Information privacy: Measuring individuals' concerns about organizational practices
    • Smith HJ, Milberg SJ, Burke SJ (1996) Information privacy: measuring individuals' concerns about organizational practices. MIS Quart 20(2):167-196
    • (1996) MIS Quart , vol.20 , Issue.2 , pp. 167-196
    • Smith, H.J.1    Milberg, S.J.2    Burke, S.J.3
  • 13
    • 85001759514 scopus 로고    scopus 로고
    • Internet privacy: Interpreting key issues
    • Dhillon GS, Moores TT (2001) Internet privacy: interpreting key issues. Inf Resources Manag J 14(4):33-37
    • (2001) Inf Resources Manag J , vol.14 , Issue.4 , pp. 33-37
    • Dhillon, G.S.1    Moores, T.T.2
  • 15
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Chaum D (1985) Security without identification: transaction systems to make big brother obsolete. Commun ACM 28(10):1030-1044
    • (1985) Commun ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 16
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with crowds
    • Reiter MK, Rubin AD (1999) Anonymous web transactions with crowds. Commun ACM 42(2):32-38
    • (1999) Commun ACM , vol.42 , Issue.2 , pp. 32-38
    • Reiter, M.K.1    Rubin, A.D.2
  • 17
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connection
    • Goldschlag DM, Reed MG, Syverson PF (1999) Onion routing for anonymous and private internet connection. Commun ACM 42(2):39-41
    • (1999) Commun ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 21
    • 4544259863 scopus 로고    scopus 로고
    • An architecture for privacy-sensitive ubiquitous computing
    • applications, and services (MobiSys 2004), Boston, Massachusetts, June 2004
    • Hong J (2004) An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd international conference on mobile systems, applications, and services (MobiSys 2004), Boston, Massachusetts, June 2004
    • (2004) Proceedings of the 2nd International Conference on Mobile Systems
    • Hong, J.1
  • 23
    • 84993048403 scopus 로고    scopus 로고
    • The platform for privacy preference as a social protocol: An examination within the US policy context
    • Hockheiser H (2002) The platform for privacy preference as a social protocol: an examination within the US policy context. ACM Trans Internet Technol 2(4):276-306
    • (2002) ACM Trans Internet Technol , vol.2 , Issue.4 , pp. 276-306
    • Hockheiser, H.1
  • 24
    • 0002265410 scopus 로고    scopus 로고
    • The platform for privacy preferences
    • Cranor L, Reagle J (1998) The platform for privacy preferences. Commun ACM 42(2):48-55
    • (1998) Commun ACM , vol.42 , Issue.2 , pp. 48-55
    • Cranor, L.1    Reagle, J.2
  • 25
    • 84900509292 scopus 로고    scopus 로고
    • General overview of the P3P architecture
    • available at
    • Ackerman MS (1997) General overview of the P3P architecture. World Wide Web Consortium, available at http://www.w3.org/TR/WD-P3P-arch.html
    • (1997) World Wide Web Consortium
    • Ackerman, M.S.1
  • 27
    • 84937411601 scopus 로고    scopus 로고
    • A privacy awareness system for ubiquitous computing environments
    • Göteborg, Sweden, September/October 2002, available at
    • Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of the international conference ubiquitous computing (UbiComp 2002), Göteborg, Sweden, September/October 2002, available at http://www.inf.ethz.ch/-langhein
    • (2002) Proceedings of the International Conference Ubiquitous Computing (UbiComp 2002)
    • Langheinrich, M.1
  • 29
    • 33749616926 scopus 로고    scopus 로고
    • Open letter to P3P developers and replies
    • freedom and privacy: challenging the assumptions (CFP 2000), Toronto, Ontario, Canada, April 2000
    • Catlett J (2000) Open letter to P3P developers and replies. In: Proceedings of the 10th conference on computers, freedom and privacy: challenging the assumptions (CFP 2000), Toronto, Ontario, Canada, April 2000, pp 157-164
    • (2000) Proceedings of the 10th Conference on Computers , pp. 157-164
    • Catlett, J.1
  • 30
    • 0038007758 scopus 로고    scopus 로고
    • Designing a social protocol: Lessons learned from the Platform for Privacy Preferences
    • MacKie-Mason J, Waterman D (eds) Lawrence Erlbaum Associates, Mahwah, New Jersey
    • Cranor LF, Reagle J Jr (1998) Designing a social protocol: lessons learned from the Platform for Privacy Preferences. In: MacKie-Mason J, Waterman D (eds) Telephony, the internet, and the media. Lawrence Erlbaum Associates, Mahwah, New Jersey
    • (1998) Telephony, the Internet, and the Media
    • Cranor, L.F.1    Reagle Jr., J.2
  • 31
    • 0034459145 scopus 로고    scopus 로고
    • The intellectual challenge of CSCW: The gap between social requirements and technical feasibility
    • Ackerman MS (2000) The intellectual challenge of CSCW: the gap between social requirements and technical feasibility. Hum Comput Interact 15(2-3):179-204
    • (2000) Hum Comput Interact , vol.15 , Issue.2-3 , pp. 179-204
    • Ackerman, M.S.1
  • 32
    • 24144487579 scopus 로고    scopus 로고
    • The intellectual challenge of CSCW: The gap between social requirements and technical feasibility
    • Carroll JM (ed) Addison-Wesley, New York
    • Ackerman MS (2001) The intellectual challenge of CSCW: the gap between social requirements and technical feasibility. In: Carroll JM (ed) Human-computer interaction in the new millennium. Addison-Wesley, New York
    • (2001) Human-computer Interaction in the New Millennium
    • Ackerman, M.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.