-
1
-
-
84976845043
-
End-to-end arguments in system design
-
Nov.
-
Saltzer, J., Reed, D., and Clark, D. D., 1984. “End-to-end arguments in system design.” ACM Trans. Comput. Syst., Vol. 2, No. 4, Nov., pp. 277-288.
-
(1984)
ACM Trans. Comput. Syst.
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.1
Reed, D.2
Clark, D.D.3
-
2
-
-
85024264348
-
Song of the open road: Building a broadband network for the 21st century
-
The Center for Media Education, Section IV
-
Larson, G. and Jeffrey, C., 1999. “Song of the open road: Building a broadband network for the 21st century.” The Center for Media Education, Section IV, p 6.
-
(1999)
, pp. 6
-
-
Larson, G.1
Jeffrey, C.2
-
3
-
-
8844267239
-
Open access is just the tip of the iceberg
-
Oct. 22.
-
Saltzer, J., 1999. “Open access is just the tip of the iceberg.” Oct. 22.
-
(1999)
-
-
Saltzer, J.1
-
4
-
-
85024284811
-
Filing before the Federal Communications Commission, (In the Matter of Application for Consent to the Transfer of Control of Licenses Media-Rethinking the Design of the Internet 99 ACM Transactions on Internet Technology
-
August 2001 One Group, Inc. to AT & T Corp. CS Docket No. 99-251).
-
Lemley, M. A. and Lessig, L., 1999. Filing before the Federal Communications Commission, (In the Matter of Application for Consent to the Transfer of Control of Licenses Media-Rethinking the Design of the Internet 99 ACM Transactions on Internet Technology, Vol. 1, No. 1, August 2001. One Group, Inc. to AT & T Corp. CS Docket No. 99-251).
-
(1999)
, vol.1
, Issue.1
-
-
Lemley, M.A.1
Lessig, L.2
-
5
-
-
0027005999
-
Achieving electronic privacy
-
Scientific American Aug.
-
Chaum, D., 1992. “Achieving electronic privacy.” Scientific American, Aug., pp. 96-101.
-
(1992)
, pp. 96-101
-
-
Chaum, D.1
-
6
-
-
84873552610
-
Fearing a plague of ‘Web bugs’: Invisible fact-gathering code raises privacy concerns
-
Washington Post Nov. 13, E1, E8.
-
O'Harrow, R., Jr., 1999. “Fearing a plague of ‘Web bugs’: Invisible fact-gathering code raises privacy concerns.” Washington Post, Nov. 13, E1, E8.
-
(1999)
-
-
O'Harrow, R.1
-
7
-
-
85024246547
-
Intel drops plans for ID numbers
-
Washington Post Jan.
-
O'Harrow, R., Jr. and Corcoran, E., 1999. “Intel drops plans for ID numbers.” Washington Post, Jan. 26.
-
(1999)
, pp. 26
-
-
O'Harrow, R.1
Corcoran, E.2
-
8
-
-
85024289970
-
Your PC is watching: programs that send personal data becoming routine
-
Washington Post, July 14
-
Cha, A. E., 2000. “Your PC is watching: programs that send personal data becoming routine, Washington Post, July 14, A1, A12-A13.
-
(2000)
, vol.A1
, pp. A12-A13
-
-
Cha, A.E.1
-
9
-
-
0003467282
-
The Digital Dilemma: Intellectual Property in the Information Age
-
National Academy Press.
-
Computer Science and Telecommunications Board, 2000. The Digital Dilemma: Intellectual Property in the Information Age. National Academy Press.
-
(2000)
-
-
-
10
-
-
85024251232
-
Web surfers beware: Someone’s watching
-
InformationWeek Online Feb. 7.
-
D'antoni, H., 2000. “Web surfers beware: Someone’s watching.” InformationWeek Online, Feb. 7.
-
(2000)
-
-
D'antoni, H.1
-
11
-
-
85024244748
-
Postage due on junk e-mail—Spam costs Internet millions every month
-
Internet Week, May 4, 1998.
-
Dorn, D., 1998. “Postage due on junk e-mail—Spam costs Internet millions every month.” Internet Week, May 4, 1998.
-
(1998)
-
-
Dorn, D.1
-
12
-
-
85024293755
-
Inside the game of e-mail hijacking
-
The Wall Street Journal Nov. 9
-
Moss, M., 1999. “Inside the game of e-mail hijacking.” The Wall Street Journal, Nov. 9, B1, B4.
-
(1999)
, pp. B1-B4
-
-
Moss, M.1
-
14
-
-
85024285560
-
Internet engineers reject wiretap proposal
-
The New York Times Nov. 11
-
Clausing, J., 1999. “Internet engineers reject wiretap proposal.” The New York Times, Nov. 11, B10.
-
(1999)
, pp. B10
-
-
Clausing, J.1
-
15
-
-
84923618097
-
FBI’s wiretaps to scan e-mail spark concern
-
The Wall Street Journal, July 11
-
King, N., Jr. and Bridis, T., 2000. “FBI’s wiretaps to scan e-mail spark concern.” The Wall Street Journal, July 11, A3, A6.
-
(2000)
, pp. A3-A6
-
-
King, N.1
Bridis, T.2
-
16
-
-
0005470307
-
Zoning speech on the Internet: A legal and technical model
-
Lessig, L. and Resnick, P., 1999. “Zoning speech on the Internet: A legal and technical model.” Michigan Law Review 98, 2, pp. 395-431.
-
(1999)
Michigan Law Review 98
, vol.2
, pp. 395-431
-
-
Lessig, L.1
Resnick, P.2
-
17
-
-
0348243284
-
Advertising and Marketing on the Internet: Rules of the Road
-
Washington, DC, Aug.
-
US Federal Trade Commission, 1998. Advertising and Marketing on the Internet: Rules of the Road, Washington, DC, Aug.
-
(1998)
-
-
-
18
-
-
0347832783
-
PICS, censorship, & intellectual freedom FAQ
-
Resnick, P., Ed. 1999. “PICS, censorship, & intellectual freedom FAQ.
-
(1999)
-
-
Resnick, P.1
-
19
-
-
0005063385
-
Onion routing for anonymous and private Internet connections
-
Feb.
-
Goldschlag, D. M., Reed, M. G., and Syverson, P. F., 1999. “Onion routing for anonymous and private Internet connections.” Communications of the ACM, 42, 2, Feb.
-
(1999)
Communications of the ACM
, vol.42
, pp. 2
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
20
-
-
0032218236
-
The design, implementation and operation of an email pseudonym server
-
San Francisco, CA, Nov.
-
Maziéres, D. and Kaashoek, M. F., 1998. “The design, implementation and operation of an email pseudonym server.” In Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS-5), San Francisco, CA, Nov., pp. 27-36.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS-5)
, pp. 27-36
-
-
Maziéres, D.1
Kaashoek, M.F.2
-
21
-
-
85024263968
-
The essential role of trusted third parties in electronic commerce Oregon Law Review
-
Froomkin, A. M. 1996. “The essential role of trusted third parties in electronic commerce Oregon Law Review 75: 29.
-
(1996)
, vol.75
, pp. 29
-
-
Froomkin, A.M.1
-
22
-
-
77957861931
-
A fair non-repudiation protocol
-
Oakland, CA, May 6-8
-
Zhou, J. and Gollmann, D., 1996. “A fair non-repudiation protocol.” In Proceedings of the 1996 Symposium on Security and Privacy, Oakland, CA, May 6-8.
-
(1996)
Proceedings of the 1996 Symposium on Security and Privacy
-
-
Zhou, J.1
Gollmann, D.2
-
23
-
-
85024260389
-
What is a notary public?
-
National Notary Association, 1997, “What is a notary public?”.
-
(1997)
-
-
-
24
-
-
35248856268
-
Privacy-enhancing technologies for the Internet
-
Goldberg, I., Wagner, D., and Brewer, E., 1997. “Privacy-enhancing technologies for the Internet.”.
-
(1997)
-
-
Goldberg, I.1
Wagner, D.2
Brewer, E.3
-
25
-
-
85024290076
-
Critics press legal assault on tracking of Web users
-
The New York Times Feb. 7
-
Tedeschi, B., 2000. “Critics press legal assault on tracking of Web users.” The New York Times, Feb. 7, C1, C10.
-
(2000)
, pp. C1-C10
-
-
Tedeschi, B.1
-
26
-
-
84986174035
-
E-commerce firms start to rethink opposition to privacy regulation as abuses, anger rise
-
Jan.
-
Simpson, G. R., 2000, “E-commerce firms start to rethink opposition to privacy regulation as abuses, anger rise.” The Wall Street Journal, Jan. 6, A24.
-
(2000)
The Wall Street Journal
, vol.6
, pp. A24
-
-
Simpson, G.R.1
-
27
-
-
85024276827
-
The unacknowledged legislators of the digital world
-
In Atlantic Unbound Dec. 15
-
Mann, C. C., 1999. “The unacknowledged legislators of the digital world.” In Atlantic Unbound, Dec. 15.
-
(1999)
-
-
Mann, C.C.1
-
29
-
-
85024265037
-
Judge rules ISP, server location may determine jurisdiction
-
ISP-Planet, June 11
-
Fusco, P., 1999. “Judge rules ISP, server location may determine jurisdiction.” ISP-Planet, June 11.
-
(1999)
-
-
Fusco, P.1
-
30
-
-
0346503626
-
Judge in gambling case takes on sticky issue of jurisdiction
-
The New York Times Aug.
-
Kaplan, C. S., 1999. “Judge in gambling case takes on sticky issue of jurisdiction.” The New York Times, Aug. 13, B10.
-
(1999)
, vol.13
, pp. B10
-
-
Kaplan, C.S.1
-
31
-
-
8844267239
-
Open access’ is just the tip of the iceberg
-
Essay for the Newton, MA Cable Commission Oct. 22.
-
Saltzer, J., 1999. “‘Open access’ is just the tip of the iceberg.” Essay for the Newton, MA Cable Commission, Oct. 22.
-
(1999)
-
-
Saltzer, J.1
-
32
-
-
34250890419
-
Digital commerce: the Internet relies on networks’ passing data to one another But what happens if one of them refuses?
-
The New York Times Feb. 14
-
Caruso, D., 2000. “Digital commerce: the Internet relies on networks’ passing data to one another. But what happens if one of them refuses? The New York Times, Feb. 14, C4.
-
(2000)
, pp. C4
-
-
Caruso, D.1
-
33
-
-
85024245749
-
Reliable and trustworthy: the challenge of cyber-infrastructure protection at the edge of the millennium
-
iMP Magazine, Sept.
-
Blumenthal, M. S., 1999. “Reliable and trustworthy: the challenge of cyber-infrastructure protection at the edge of the millennium.” iMP Magazine, Sept.
-
(1999)
-
-
Blumenthal, M.S.1
-
34
-
-
0012025428
-
Harry Potter and the Chamber of Secrets, Bloomsbury
-
Rowling, J. K., 1998. Harry Potter and the Chamber of Secrets, Bloomsbury, p. 242.
-
(1998)
, pp. 242
-
-
Rowling, J.K.1
-
35
-
-
85024284280
-
China puts clamps on Internet; communists seek information curb
-
The Washington Post Jan. 27
-
Pomfret, J., 2000. “China puts clamps on Internet; communists seek information curb.” The Washington Post, Jan. 27.
-
(2000)
-
-
Pomfret, J.1
|