-
1
-
-
0010100287
-
Risks of anonymity
-
Anonymous.
-
Anonymous. 1996. Risks of anonymity. Commun. ACM 39, 12, 162.
-
(1996)
Commun. ACM
, vol.39
, Issue.12
, pp. 162
-
-
-
2
-
-
85025425682
-
Art Technology Group
-
Atg dynamo e-business platform. http://www.atg.com/products.
-
Art Technology Group. 2001. Atg dynamo e-business platform. http://www.atg.com/products.
-
(2001)
-
-
-
3
-
-
0141902726
-
Role based access control for the world wide web
-
Barkley, J. F., Cincotta, A. V., Ferraiolo, D. F., Gavrilla, S., and Kuhn, D. R. 1997. Role based access control for the world wide web. In Proceedings of the 20th National Information System Security Conference (NIST/NSA).
-
(1997)
Proceedings of the 20th National Information System Security Conference (NIST/NSA).
-
-
Barkley, J.F.1
Cincotta, A.V.2
Ferraiolo, D.F.3
Gavrilla, S.4
Kuhn, D.R.5
-
4
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
Mitre Corporation, Bedford, Mass.
-
Bell, D. and Lapadula, L. 1976. Secure computer systems: Unified exposition and multics interpretation. Tech. Rep. MTR 2997. Mitre Corporation, Bedford, Mass.
-
(1976)
Tech. Rep. MTR 2997.
-
-
Bell, D.1
Lapadula, L.2
-
5
-
-
0023861504
-
Concerning“modeling” of computer security
-
(Oakland, Calif. Apr. 18-21). IEEE Computer Society Press, Los Alamitos, Calif
-
Bell, D. E. 1988. Concerning“modeling” of computer security. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif. Apr. 18-21). IEEE Computer Society Press, Los Alamitos, Calif.
-
(1988)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Bell, D.E.1
-
6
-
-
84963503600
-
Project“Anonymity and unobservability in the internet”
-
2000 (Westin Harbour Castle, Toronto, Ont., Canada, Apr. 4-7)
-
Berthold, O., Federrath, H., and Kohntopp (Hansen), M. 2000. Project“Anonymity and unobservability in the internet” In Proceedings of the 10th Conference on Computers, Freedom & Privacy 2000 (Westin Harbour Castle, Toronto, Ont., Canada, Apr. 4-7), 57-68.
-
Proceedings of the 10th Conference on Computers, Freedom & Privacy 2000
, pp. 57-68
-
-
Berthold, O.1
Federrath, H.2
Kohntopp (Hansen), M.3
-
7
-
-
84937540415
-
Identity management based on P3P
-
H. Federrath, Ed. Lecture Notes in Computer Science Springer-Verlag, Berlin-Heidelberg, Germany
-
Berthold, O. and Kohntopp (Hansen), M. 2001. Identity management based on P3P. In Anonymity 2000, H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin-Heidelberg, Germany, 141-160.
-
(2001)
Anonymity 2000
, vol.2009
, pp. 141-160
-
-
Berthold, O.1
Kohntopp (Hansen), M.2
-
8
-
-
85025394737
-
Etrust Internet Privacy Study: Summary of Market Survey Results
-
Boston Consulting Group.
-
Boston Consulting Group. 1997. Etrust Internet Privacy Study: Summary of Market Survey Results. Tech. rep.
-
(1997)
Tech. rep.
-
-
-
9
-
-
1142280648
-
-
Boston Consulting Group. Shop. org, http://www.shop. org
-
Boston Consulting Group. 2002. The State of Retailing Online 5.0. Shop. org, http://www.shop. org.
-
(2002)
The State of Retailing Online 5.0.
-
-
-
10
-
-
0024663219
-
The chinese wall security policy
-
(Oakland, Calif., May 1-3). IEEE Computer Society Press, Los Alamitos, Calif.
-
Brewer, D. F. and Nash, M. J. 1989. The chinese wall security policy. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 1-3). IEEE Computer Society Press, Los Alamitos, Calif., 206-214.
-
(1989)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 206-214
-
-
Brewer, D.F.1
Nash, M.J.2
-
11
-
-
0002784640
-
Methods and techniques of adaptive hypermedia
-
P. Brusilovsky, A. Kobsa, and J. Vassileva, Eds. Kluwer Academic Publishers, Dordrecht, Netherlands
-
Brusilovsky, P. 1998. Methods and techniques of adaptive hypermedia. In Adaptive Hypertext and Hypermedia, P. Brusilovsky, A. Kobsa, and J. Vassileva, Eds. Kluwer Academic Publishers, Dordrecht, Netherlands, 1-43.
-
(1998)
Adaptive Hypertext and Hypermedia
, pp. 1-43
-
-
Brusilovsky, P.1
-
12
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D. L. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2, 84-88.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
13
-
-
0001533447
-
Acquiring user models
-
Chin, D. N. 1993. Acquiring user models. Artif. Intel. Rev. 7, 3-4, 185-197.
-
(1993)
Artif. Intel. Rev.
, vol.7
, Issue.3-4
, pp. 185-197
-
-
Chin, D.N.1
-
14
-
-
0035480037
-
Identity management and its support of multilateral security
-
Claub, S. and Kohntopp (Hansen), M. 2001. Identity management and its support of multilateral security. Computer Netw. 37, 205-219.
-
(2001)
Computer Netw.
, vol.37
, pp. 205-219
-
-
Claub, S.1
Kohntopp (Hansen), M.2
-
15
-
-
0032017696
-
Speech acts, electronic commerce, and KQML
-
Covington, M. A. 1998. Speech acts, electronic commerce, and KQML. Deci. Supp. Syst. 22, 3, 203-211.
-
(1998)
Deci. Supp. Syst.
, vol.22
, Issue.3
, pp. 203-211
-
-
Covington, M.A.1
-
16
-
-
85025397651
-
-
A P3P preference exchange language 1.0 (APPEL 1.0): W3C working draft 15 April 2002. http://www.w3.org/tr/p3p-preferences/World Wide Web Consortium.
-
Cranor, L., Langheinrich, M., and Marchiori, M. 2002a. A P3P preference exchange language 1.0 (APPEL 1.0): W3C working draft 15 April 2002. http://www.w3.org/tr/p3p-preferences/World Wide Web Consortium.
-
(2002)
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
-
17
-
-
85025421598
-
-
The platform for privacy preferences 1.0 (P3P1.0) specification: W3C recommendation 16 April 2002. http://www.w3.org/tr/p3p/, World Wide Web Consortium.
-
Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., and Reagle, J. 2002b. The platform for privacy preferences 1.0 (P3P1.0) specification: W3C recommendation 16 April 2002. http://www.w3.org/tr/p3p/, World Wide Web Consortium.
-
(2002)
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Presler-Marshall, M.4
Reagle, J.5
-
18
-
-
0003582713
-
Beyond concern: Understanding net users' attitudes about online privacy.
-
Att labs-research technical report TR 99.4.3, http://www.research.att.eom/library/trs/trs/99/99.4/.
-
Cranor, L. F., Reagle, J., and Ackerman, M. S. 1999. Beyond concern: Understanding net users' attitudes about online privacy. Att labs-research technical report TR 99.4.3, http://www.research.att.eom/library/trs/trs/99/99.4/.
-
(1999)
-
-
Cranor, L.F.1
Reagle, J.2
Ackerman, M.S.3
-
19
-
-
0005927431
-
Model Code for the Protection of Personal Information
-
CSA Canadian Standards Association. http://www.csa.ca/standards/privacy/code/.
-
CSA 1996. Model Code for the Protection of Personal Information. Tech. rep., Canadian Standards Association. http://www.csa.ca/standards/privacy/code/.
-
(1996)
Tech. rep.
-
-
-
20
-
-
1642273287
-
The Culnan-Milne survey on consumers & online privacy notices: Summary of responses
-
(Washington, D.C., Dec. 4, 2001)
-
Culnan, M. J. and Milne, G. R. 2001. The Culnan-Milne survey on consumers & online privacy notices: Summary of responses. In Interagency Public Workshop: Get Noticed: Effective Financial Privacy Notices (Washington, D.C., Dec. 4, 2001). 47-54.
-
(2001)
Interagency Public Workshop: Get Noticed: Effective Financial Privacy Notices
, pp. 47-54
-
-
Culnan, M.J.1
Milne, G.R.2
-
21
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D. E. 1976. A lattice model of secure information flow. Commun. ACM 19, 5, 236-243.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
23
-
-
3042807227
-
Aarp national survey on consumer preparedness and e-commerce: A survey of computer users age 45 and olDer
-
Aarp, Washington, D.C.
-
Depallo, M. 2000. Aarp national survey on consumer preparedness and e-commerce: A survey of computer users age 45 and olDer. Tech. rep., Aarp, Washington, D.C.
-
(2000)
Tech. rep.
-
-
Depallo, M.1
-
25
-
-
85025406488
-
-
EC Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.
-
EC 1995. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities of 23 November 1995 No L. 281.
-
(1995)
Official Journal of the European Communities of 23 November 1995 No L. 281.
-
-
-
26
-
-
85025403520
-
-
EC Directive 2002/58/EC of the European Parliament and of the Council of 24 october 1995 Concerning the Processingof Personal Data and the Protection of Privacy in the Electronic Communications Sector.
-
EC 2002. Directive 2002/58/EC of the European Parliament and of the Council of 24 october 1995 Concerning the Processingof Personal Data and the Protection of Privacy in the Electronic Communications Sector. Official Journal of the European Communities of 31 July 2002 No L 201/37.
-
(2002)
Official Journal of the European Communities of 31 July 2002 No L 201/37.
-
-
-
27
-
-
0002422823
-
A role-based access control model and reference implementation wIthin a corporate intranet
-
Ferraiolo, D. F., Barkley, J. F., and Kuhn, D. R. 1999. A role-based access control model and reference implementation wIthin a corporate intranet. ACM Trans. Inf. Syst. Sec. 2, 1, 34-64.
-
(1999)
ACM Trans. Inf. Syst. Sec.
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
28
-
-
0003993042
-
Draft specification of the Kqml agent-communication language
-
Finin, T. and Weber, J. 1993. Draft specification of the Kqml agent-communication language. Tech. Rep.
-
(1993)
Tech. Rep.
-
-
Finin, T.1
Weber, J.2
-
29
-
-
0002712081
-
Gums-A general user modeling shell
-
A. Kobsa and W. Wahlster, Eds. Springer, Berlin, Heidelberg, New York
-
Finin, T. W. 1989. Gums-A general user modeling shell. In User Models in Dialog Systems, A. Kobsa and W. Wahlster, Eds. Springer, Berlin, Heidelberg, New York, 411-430.
-
(1989)
User Models in Dialog Systems
, pp. 411-430
-
-
Finin, T.W.1
-
30
-
-
0004323627
-
User modeling servers: Requirements, design, and evaluation
-
Ph.D. dissertation, Department of Mathematics and Computer Science, University of Essen, Germany.
-
Fink, J. 2003. User modeling servers: Requirements, design, and evaluation. Ph.D. dissertation, Department of Mathematics and Computer Science, University of Essen, Germany.
-
(2003)
-
-
Fink, J.1
-
31
-
-
0034484385
-
A review and analysis of commercial user modeling servers for personalization on the world wide web
-
http://www.ics.uci.edu/~kobsa/papers/2000-UMUAI-kobsa.pdf.
-
Fink, J. and Kobsa, A. 2000. A review and analysis of commercial user modeling servers for personalization on the world wide web. User Mod. User-Adapted Interact. 10, 3-4, 209-249. http://www.ics.uci.edu/~kobsa/papers/2000-UMUAI-kobsa.pdf.
-
(2000)
User Mod. User-Adapted Interact.
, vol.10
, Issue.3-4
, pp. 209-249
-
-
Fink, J.1
Kobsa, A.2
-
32
-
-
0036723093
-
User Modeling in personalized city tours
-
http://www.ics.uci.edu/~kobsa/papers/2002-AIR-kobsa.pdf.
-
Fink, J. and Kobsa, A. 2002. User Modeling in personalized city tours. Artif. Intel. Rev. 18, 1, 33-74.http://www.ics.uci.edu/~kobsa/papers/2002-AIR-kobsa.pdf.
-
(2002)
Artif. Intel. Rev.
, vol.18
, Issue.1
, pp. 33-74
-
-
Fink, J.1
Kobsa, A.2
-
33
-
-
0032260316
-
Adaptable and adaptive information provision for all users, including disabled and elderly people
-
Taylor Graham, London http://www.ics.uci.edu/~kobsa/papers/1998-Nrhm-kobsa.pdf.
-
Fink, J., Kobsa, A., and Nill, A. 1998. Adaptable and adaptive information provision for all users, including disabled and elderly people. In New Review of Hypermedia and Multimedia 4. Taylor Graham, London, 163-188. http://www.ics.uci.edu/~kobsa/papers/1998-Nrhm-kobsa.pdf.
-
(1998)
New Review of Hypermedia and Multimedia 4.
, pp. 163-188
-
-
Fink, J.1
Kobsa, A.2
Nill, A.3
-
34
-
-
0012749622
-
Putting personalization into practice
-
Fink, J., Koenemann, J., Noller, S., and Schwab, I. 2002. Putting personalization into practice. Commun. ACM 45, 5, 41-42.
-
(2002)
Commun. ACM
, vol.45
, Issue.5
, pp. 41-42
-
-
Fink, J.1
Koenemann, J.2
Noller, S.3
Schwab, I.4
-
37
-
-
0003745794
-
Trust and privacy online: Why Americans want to rewrite the rules
-
The Pew Internet & American Life Project, Washington, D.C.
-
FOX, S. 2000. Trust and privacy online: Why Americans want to rewrite the rules. Tech. rep. The Pew Internet & American Life Project, Washington, D.C.
-
(2000)
Tech. rep.
-
-
FOX, S.1
-
38
-
-
0004249393
-
The SSL protocol
-
version 3.0. Tech. rep., Netscape Communications Company.
-
Freier, A. O., Karlton, P., and Kocher, P. C. 1996. The SSL protocol, version 3.0. Tech. rep., Netscape Communications Company.
-
(1996)
-
-
Freier, A.O.1
Karlton, P.2
Kocher, P.C.3
-
39
-
-
0012207557
-
Consistent, yet anonymous, web access with LPWA
-
Gabber, E., Gibbons, P. B., Kristol, D. M., Matias, Y., and Mayer, A. 1999. Consistent, yet anonymous, web access with LPWA. Commun. ACM 42, 2, 42-47.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 42-47
-
-
Gabber, E.1
Gibbons, P.B.2
Kristol, D.M.3
Matias, Y.4
Mayer, A.5
-
40
-
-
0003317098
-
How to make personalized web browsing simple, secure, and anonymous
-
(Anguilla, British West Indies, February 24-28). R. Hirschfeld, Ed. Springer-Verlag, New York
-
Gabber, E., Gibbons, P. B., Matias, Y, and Mayer, A. 1997. How to make personalized web browsing simple, secure, and anonymous. In Financial Cryptography, Proceedings of the 1st International Conference (FC'97) (Anguilla, British West Indies, February 24-28). R. Hirschfeld, Ed. Springer-Verlag, New York, 17-31.
-
(1997)
Financial Cryptography, Proceedings of the 1st International Conference (FC'97)
, pp. 17-31
-
-
Gabber, E.1
Gibbons, P.B.2
Matias, Y.3
Mayer, A.4
-
41
-
-
0032180215
-
Anonymous mechanisms in group decision support systems communication
-
Gavish, B. and Gerdes, J. H. 1998. Anonymous mechanisms in group decision support systems communication. Dec. Supp. Syst. 23, 4, 297-328.
-
(1998)
Dec. Supp. Syst.
, vol.23
, Issue.4
, pp. 297-328
-
-
Gavish, B.1
Gerdes, J.H.2
-
42
-
-
0020299523
-
Security policies and security models
-
(Oakland, Calif., Apr. 26-28). IEEE Computer Society Press, Los Alamitos, Calif.
-
Goguen, J. and Meseguer, J. 1982. Security policies and security models. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., Apr. 26-28). IEEE Computer Society Press, Los Alamitos, Calif., 11-20.
-
(1982)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 11-20
-
-
Goguen, J.1
Meseguer, J.2
-
43
-
-
0021177508
-
Unwinding and inference control
-
(Oakland, Calif., Apr. 29-May 2). IEEE Computer Society Press, Los Alamitos, Calif.
-
Goguen, J. A. and Meseguer, J. 1984. Unwinding and inference control. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., Apr. 29-May 2). IEEE Computer Society Press, Los Alamitos, Calif., 75-86.
-
(1984)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 75-86
-
-
Goguen, J.A.1
Meseguer, J.2
-
44
-
-
0005063385
-
Onion Routing for anonymous and private internet connections
-
Goldschlag, D., Reed, M., and Syverson, P. 1999. Onion Routing for anonymous and private internet connections. Commun. ACM 42, 2, 39-41.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
45
-
-
85031542311
-
Mixing email with Babel
-
(San Diego, Calif., Feb. 22-23). IEEE Computer Society Press, Los Alamitos, Calif.
-
Gulcu, C. and Tsudik, G. 1996. Mixing email with Babel. In Proceedings of the Internet Society Symposium on Network and Distributed Systems Security (Sndss'96) (San Diego, Calif., Feb. 22-23). IEEE Computer Society Press, Los Alamitos, Calif., 2-16.
-
(1996)
Proceedings of the Internet Society Symposium on Network and Distributed Systems Security (Sndss'96)
, pp. 2-16
-
-
Gulcu, C.1
Tsudik, G.2
-
46
-
-
0004126159
-
-
GVU Graphics, Visualization, & Usability Center, College of Computing, Georgia Institute of Technology, Atlanta, Ga. http://www.cc. gatech.edu/gvu/user_surveys/survey-1998-10/.
-
GVU 1998. GVU's tenth WWW user survey. Tech. rep., Graphics, Visualization, & Usability Center, College of Computing, Georgia Institute of Technology, Atlanta, Ga. http://www.cc. gatech.edu/gvu/user_surveys/survey-1998-10/.
-
(1998)
GVU's tenth WWW user survey. Tech. rep.
-
-
-
47
-
-
85025397747
-
Introducing SSL and certificates using SSLeay
-
HIRSCH, F. J. 1997. Introducing SSL and certificates using SSLeay. WWW J., 141-173.
-
(1997)
WWW J.
, pp. 141-173
-
-
HIRSCH, F.J.1
-
48
-
-
0010834145
-
IBM multi-national consumer privacy survey
-
IBM http://www.ibm.com/services/files/privacy_survey_oct991.pdf.
-
IBM. 1999. IBM multi-national consumer privacy survey, http://www.ibm.com/services/files/privacy_survey_oct991.pdf.
-
(1999)
-
-
-
51
-
-
0033905512
-
Jatlite: A java agent infrastructure with message routing
-
Jeon, H., Petrie, C., and Cutkosky, M. R. 2000. Jatlite: A java agent infrastructure with message routing. IEEE Inter. Comput. 4, 2, 87-96.
-
(2000)
IEEE Inter. Comput.
, vol.4
, Issue.2
, pp. 87-96
-
-
Jeon, H.1
Petrie, C.2
Cutkosky, M.R.3
-
52
-
-
85025396306
-
Generalisation and security-improvement of mix-mediated anonymous communication
-
Ph.D. dissertation. Department of Computer Science, Dresden University of Technology, Dresden Germany.
-
Jerichow, A. 1999. Generalisation and security-improvement of mix-mediated anonymous communication. Ph.D. dissertation. Department of Computer Science, Dresden University of Technology, Dresden Germany.
-
(1999)
-
-
Jerichow, A.1
-
53
-
-
0008946659
-
Building a user model implicitly from a cooperative advisory dialog
-
Kass, R. 1991. Building a user model implicitly from a cooperative advisory dialog. User Mod. User-Adapted Interact. 1, 3, 203-258.
-
(1991)
User Mod. User-Adapted Interact.
, vol.1
, Issue.3
, pp. 203-258
-
-
Kass, R.1
-
54
-
-
0028717841
-
The um toolkit for cooperative user modelling
-
Kay, J. 1995. The um toolkit for cooperative user modelling. User Mod. User-Adapted Interact. 4, 3, 149-196.
-
(1995)
User Mod. User-Adapted Interact.
, vol.4
, Issue.3
, pp. 149-196
-
-
Kay, J.1
-
55
-
-
84862334846
-
On the Chinese wall model
-
(Toulouse, France, Nov. 23-25). Y. Deswarte, G. Eizenberg, and J.-J. Quisquater, Eds. Springer-Verlag, New York
-
Kessler, V. 1992. On the Chinese wall model. In Computer Security-ESORICS 92, Proceedings of the 2nd European Symposium on Research in Computer Security (Toulouse, France, Nov. 23-25). Y. Deswarte, G. Eizenberg, and J.-J. Quisquater, Eds. Springer-Verlag, New York, 41-54.
-
(1992)
Computer Security-ESORICS 92, Proceedings of the 2nd European Symposium on Research in Computer Security
, pp. 41-54
-
-
Kessler, V.1
-
56
-
-
84957649548
-
Identity escrow
-
(Santa Barbara, Calif.), H. Krawczyk, Ed. Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York
-
Kilian, J. and Petrank, E. 1998. Identity escrow. In Advances in Cryptology (CRYPTO '98) (Santa Barbara, Calif.), H. Krawczyk, Ed. Lecture Notes in Computer Science, vol 1462. Springer-Verlag, Berlin, Heidelberg, New York, 169-185.
-
(1998)
Advances in Cryptology (CRYPTO '98)
, vol.1462
, pp. 169-185
-
-
Kilian, J.1
Petrank, E.2
-
57
-
-
0003285757
-
User modeling: Recent work, prospects and hazards
-
T. K. M. Schneider-Hufschmidt and U. Malinowski, Eds. North-Holland, Amsterdam, The Netherlands
-
Kobsa, A. 1993. User modeling: Recent work, prospects and hazards. In Adaptive User Interfaces: Principles and Practice, T. K. M. Schneider-Hufschmidt and U. Malinowski, Eds. North-Holland, Amsterdam, The Netherlands, 111-128.
-
(1993)
Adaptive User Interfaces: Principles and Practice
, pp. 111-128
-
-
Kobsa, A.1
-
58
-
-
0035042834
-
Generic user modeling systems
-
http://www.ics.uci.edu/~kobsa/papers/2001-UMUAI-kobsa.pdf.
-
Kobsa, A. 2001a. Generic user modeling systems. User Mod. User-Adapted Interact. 11, 1-2, 49-63. http://www.ics.uci.edu/~kobsa/papers/2001-UMUAI-kobsa.pdf.
-
(2001)
User Mod. User-Adapted Interact.
, vol.11
, Issue.1-2
, pp. 49-63
-
-
Kobsa, A.1
-
59
-
-
84943145987
-
Tailoring privacy to users' needs (invited keynote)
-
M. Bauer, P. J. Gmytrasiewicz, and J. Vassileva, Eds. Springer, Berlin, Heidelberg, New York http://www.ics.uci.edu/kobsa/papers/2001-UM01-kobsa.pdf.
-
Kobsa, A. 2001b. Tailoring privacy to users' needs (invited keynote). In User Modeling 2001: 8th International Conference, M. Bauer, P. J. Gmytrasiewicz, and J. Vassileva, Eds. Springer, Berlin, Heidelberg, New York, 303-313. http://www.ics.uci.edu/kobsa/papers/2001-UM01-kobsa.pdf.
-
(2001)
User Modeling 2001: 8th International Conference
, pp. 303-313
-
-
Kobsa, A.1
-
60
-
-
0347164897
-
Personalized hypermedia and international privacy
-
http://www.ics.uci.edu/~kobsa/papers/2002-CACM-kobsa.pdf
-
Kobsa, A. 2002. Personalized hypermedia and international privacy. Commun. ACM 45, 5, 64-67. http://www.ics.uci.edu/~kobsa/papers/2002-CACM-kobsa.pdf.
-
(2002)
Commun. ACM
, vol.45
, Issue.5
, pp. 64-67
-
-
Kobsa, A.1
-
61
-
-
0001290002
-
Personalized Hypermedia presentation techniques for improving online customer relationships
-
http://www.ics.uci.edu/~kobsa/papers/2001-KER-kobsa.pdf.
-
Kobsa, A., Koenemann, J., and Pohl, W. 2001. Personalized Hypermedia presentation techniques for improving online customer relationships. The Knowl. Eng. Rev. 16, 2, 111-155. http://www.ics.uci.edu/~kobsa/papers/2001-KER-kobsa.pdf.
-
(2001)
The Knowl. Eng. Rev.
, vol.16
, Issue.2
, pp. 111-155
-
-
Kobsa, A.1
Koenemann, J.2
Pohl, W.3
-
62
-
-
0028754858
-
The user modeling shell system BGP-MS
-
Kobsa, A. and Pohl, W. 1995. The user modeling shell system BGP-MS. User Mod. User-Adapted Interact. 4, 2, 59-106.
-
(1995)
User Mod. User-Adapted Interact.
, vol.4
, Issue.2
, pp. 59-106
-
-
Kobsa, A.1
Pohl, W.2
-
63
-
-
33747137086
-
A standard for the performatives in the communication between applications and user modeling systems (draft)
-
http://www.ics.uci.edu/~kobsa/papers/1996-kobsa-pohl-fink-rfc.pdf.
-
Kobsa, A., Pohl, W., and Fink, J. 1996. A standard for the performatives in the communication between applications and user modeling systems (draft). http://www.ics.uci.edu/~kobsa/papers/1996-kobsa-pohl-fink-rfc.pdf.
-
(1996)
-
-
Kobsa, A.1
Pohl, W.2
Fink, J.3
-
64
-
-
0003693565
-
-
Computer Science and Electrical Engineering Department, University of Maryland, Baltimore County, Md.
-
Labrou, Y. and Finin, T. 1997. A proposal for a new Kqml specification. Tech. rep., Computer Science and Electrical Engineering Department, University of Maryland, Baltimore County, Md.
-
(1997)
A proposal for a new Kqml specification. Tech. rep.
-
-
Labrou, Y.1
Finin, T.2
-
66
-
-
84943617219
-
One for all and all in one: A learner modelling server in a multi-agent platform
-
(Banff, Canada, June 20-24), J. Kay, Ed. Springer-Verlag, Wien, New York
-
Machado, I., Martins, A., and Paiva, A. 1999. One for all and all in one: A learner modelling server in a multi-agent platform. In User Modeling, Proceedings of the 7th International Conference (UM99) (Banff, Canada, June 20-24), J. Kay, Ed. Springer-Verlag, Wien, New York, 211-221.
-
(1999)
User Modeling, Proceedings of the 7th International Conference (UM99)
, pp. 211-221
-
-
Machado, I.1
Martins, A.2
Paiva, A.3
-
67
-
-
85025424167
-
-
Frontmind. http://www.mannainc.com/products.html.
-
Manna. 2001. Frontmind. http://www.mannainc.com/products.html.
-
(2001)
Manna.
-
-
-
68
-
-
0032218236
-
The design, implementation and operation of an email pseudonym server
-
San Francisco, Calif., Nov. 2-5). ACM, New York
-
Mazieres, D. and Kaashoek, M. F. 1998. The design, implementation and operation of an email pseudonym server. In Proceedings of the 5th ACM Conference on Computer and Communications Security (San Francisco, Calif., Nov. 2-5). ACM, New York, 27-36.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 27-36
-
-
Mazieres, D.1
Kaashoek, M.F.2
-
69
-
-
85025380699
-
-
Net Perceptions. http://www.netperceptions.com.
-
Net Perceptions. 2002. Net Perceptions. http://www.netperceptions.com.
-
(2002)
Net Perceptions.
-
-
-
70
-
-
84943172279
-
-
Self-regulatory principles for online preference marketing by network advisers. http://www.ftc.gov/os/2000/07/nai 7-10 final.pdf.
-
Network Advertising Initiative. 2000. Self-regulatory principles for online preference marketing by network advisers. http://www.ftc.gov/os/2000/07/nai 7-10 final.pdf.
-
(2000)
Network Advertising Initiative.
-
-
-
72
-
-
0028737501
-
Heterogeneous learning in the Doppelganger user modeling system
-
Orwant, J. 1995. Heterogeneous learning in the Doppelganger user modeling system. User Mod. User-Adapted Interact. 4, 2, 107-130.
-
(1995)
User Mod. User-Adapted Interact.
, vol.4
, Issue.2
, pp. 107-130
-
-
Orwant, J.1
-
73
-
-
0000546828
-
Tagus-A user and learner modeling workbench
-
Paiva, A. and Self, J. 1995. Tagus-A user and learner modeling workbench. User Mod. User-Adapted Interact. 4, 3197-226.
-
(1995)
User Mod. User-Adapted Interact.
, vol.4
, pp. 3197-3226
-
-
Paiva, A.1
Self, J.2
-
74
-
-
38849201595
-
Personalization Consortium
-
Personalization & Privacy Survey. Tech. Rep. Personalization Consortium, Edgewater Place, Mass, http://www.personalization.org/SurveyResults.pdf.
-
Personalization Consortium. 2000. Personalization & Privacy Survey. Tech. Rep. Personalization Consortium, Edgewater Place, Mass, http://www.personalization.org/SurveyResults.pdf.
-
(2000)
-
-
-
75
-
-
0030382065
-
Agent-based engineering, the web, and intelligence
-
Petrie, C. J. 1996. Agent-based engineering, the web, and intelligence. Ieee Expert 11, 6, 24-29.
-
(1996)
Ieee Expert
, vol.11
, Issue.6
, pp. 24-29
-
-
Petrie, C.J.1
-
76
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity: A proposal for terminology
-
H. Federrath, Ed. Lecture Notes in Computer Science Springer-Verlag, Berlin-Heidelberg, Germany
-
Pfitzmann, A. and Kohntopp (Hansen), M. 2001. Anonymity, unobservability, and pseudonymity: A proposal for terminology. In Anonymity 2000, H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin-Heidelberg, Germany, 1-9.
-
(2001)
Anonymity 2000
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Kohntopp (Hansen), M.2
-
79
-
-
0039084976
-
An economic theory of privacy
-
F. Schoeman, Ed. Cambridge University Press
-
Posner, R. A. 1984. An economic theory of privacy. In Philosophical Dimensions of Privacy, F. Schoeman, Ed. Cambridge University Press, 333-345.
-
(1984)
Philosophical Dimensions of Privacy
, pp. 333-345
-
-
Posner, R.A.1
-
80
-
-
0035509452
-
Privacy risks in recommender systems
-
Nov.-Dec.
-
Ramakrishnan, N., Keller, J. B., Mirza, B. J., Grama, A. Y., and Karypis, G. 2001. Privacy risks in recommender systems. IEEE Internet Comput. Nov.-Dec., 54-62.
-
(2001)
IEEE Internet Comput.
, pp. 54-62
-
-
Ramakrishnan, N.1
Keller, J.B.2
Mirza, B.J.3
Grama, A.Y.4
Karypis, G.5
-
81
-
-
0002265410
-
The platform for privacy preferences
-
Reagle, J. and Cranor, L. F. 1999. The platform for privacy preferences. Commun. ACM 42, 2, 48-55.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 48-55
-
-
Reagle, J.1
Cranor, L.F.2
-
83
-
-
0001777423
-
Anonymous web transactions with crowds
-
Reiter, M. K. and Rubin, A. D. 1999. Anonymous web transactions with crowds. Commun. ACM 42, 2, 32-38.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 32-38
-
-
Reiter, M.K.1
Rubin, A.D.2
-
85
-
-
0018632276
-
User modeling via stereotypes
-
Rich, E. 1979b. User modeling via stereotypes. Cogn. Sci. 3, 329-354.
-
(1979)
Cogn. Sci.
, vol.3
, pp. 329-354
-
-
Rich, E.1
-
86
-
-
0020718591
-
Users are individuals: Individualizing user models
-
Rich, E. 1983. Users are individuals: Individualizing user models. Int. J. Man-Machine Stud. 18, 199-214.
-
(1983)
Int. J. Man-Machine Stud.
, vol.18
, pp. 199-214
-
-
Rich, E.1
-
88
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E. J., Feinstein, H. L., and Youman, C. E. 1996. Role-based access control models. IEEE Comput. 2, 2, 38-47.
-
(1996)
IEEE Comput.
, vol.2
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
89
-
-
23044524651
-
E-Commerce Recommendation Applications
-
Schafer, J. B., Konstan, J. A., and Riedl, J. 2001. E-Commerce Recommendation Applications. Data Min. Knowl. Disc. 5, 1, 115-153.
-
(2001)
Data Min. Knowl. Disc.
, vol.5
, Issue.1
, pp. 115-153
-
-
Schafer, J.B.1
Konstan, J.A.2
Riedl, J.3
-
90
-
-
0009979605
-
-
Kluwer Academic Publishers, Dordrecht, Netherlands. http://www.security-and-privacy-in-user-modeling.info
-
Schreck, J. 2003. Security and Privacy in User Modeling. Kluwer Academic Publishers, Dordrecht, Netherlands. http://www.security-and-privacy-in-user-modeling.info.
-
(2003)
Security and Privacy in User Modeling.
-
-
Schreck, J.1
-
92
-
-
0022098253
-
Umfe: A User Modelling Front-End Subsystem
-
Sleeman, D. 1985. Umfe: A User Modelling Front-End Subsystem. Inter. J. Man-Machine Stud. 23, 71-88.
-
(1985)
Inter. J. Man-Machine Stud.
, vol.23
, pp. 71-88
-
-
Sleeman, D.1
-
93
-
-
0038588436
-
E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior
-
ACM, New York
-
Spiekermann, S., Grossklags, J., and Berendt, B. 2001. E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior. In EC'01: Proceedings of the 3rd ACM Conference on Electronic Commerce. ACM, New York, 38-47.
-
(2001)
EC'01: Proceedings of the 3rd ACM Conference on Electronic Commerce.
, pp. 38-47
-
-
Spiekermann, S.1
Grossklags, J.2
Berendt, B.3
-
95
-
-
0030676973
-
Anonymous connections and onion routing
-
(Oakland, Calif., May 4-7). IEEE Computer Society Press, Los Alamitos, Calif.
-
Syverson, P. F., Goldschlag, D. M., and Reed, M. G. 1997. Anonymous connections and onion routing. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 4-7). IEEE Computer Society Press, Los Alamitos, Calif., 44-54.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
99
-
-
0042648867
-
E-commerce & privacy: What net users want
-
http://www.pwcglobal.com/gx/eng/svcs/privAcy/images/e-commerce.pdf.
-
Westin, A. F. and Maurici, D. 1998. E-commerce & privacy: What net users want. http://www.pwcglobal.com/gx/eng/svcs/privAcy/images/e-commerce.pdf.
-
(1998)
-
-
Westin, A.F.1
Maurici, D.2
-
100
-
-
0011086762
-
Empowering users to set their security goals
-
G. Mller and K. Rannenberg, Eds. Addison-Wesley-Longman, Berlin-Heidelberg, Germany
-
Wolf, G. and Pfitzmann, A. 1999. Empowering users to set their security goals. In Multilateral Security for Global Communication-Technology, Application, Business, G. Mller and K. Rannenberg, Eds. Addison-Wesley-Longman, Berlin-Heidelberg, Germany, 113-135.
-
(1999)
Multilateral Security for Global Communication-Technology, Application, Business
, pp. 113-135
-
-
Wolf, G.1
Pfitzmann, A.2
-
101
-
-
85025384413
-
People, their Roles, and their Action Potential in Electronic Environments (in German)
-
Universitat Hohenheim, Germany, 26.-27.3., K. Bauknecht, A. Bullesbach, H. Pohl, and S. Teufel, Eds. Hochschulverlag AG ETH Zurich
-
Zurfluh, U. E. 1998. People, their Roles, and their Action Potential in Electronic Environments (in German). In Sicherheit in Informationssystemen, Proceedings der Fachtagung SIS'98, Universitat Hohenheim, Germany, 26.-27.3., K. Bauknecht, A. Bullesbach, H. Pohl, and S. Teufel, Eds. Hochschulverlag AG ETH Zurich, 43-64.
-
(1998)
Sicherheit in Informationssystemen, Proceedings der Fachtagung SIS'98
, pp. 43-64
-
-
Zurfluh, U.E.1
|