메뉴 건너뛰기




Volumn 3, Issue 2, 2003, Pages 149-183

Privacy through Pseudonymity in User-Adaptive Systems

Author keywords

access control; anonymity; Chaum mix; encryption; Human Factors; KQML; personal information; personalization; privacy; pseudonymity; reference model; secrecy; Security; security; User modeling; user adaptive systems

Indexed keywords


EID: 85016682337     PISSN: 15335399     EISSN: 15576051     Source Type: Journal    
DOI: 10.1145/767193.767196     Document Type: Article
Times cited : (131)

References (101)
  • 1
    • 0010100287 scopus 로고    scopus 로고
    • Risks of anonymity
    • Anonymous.
    • Anonymous. 1996. Risks of anonymity. Commun. ACM 39, 12, 162.
    • (1996) Commun. ACM , vol.39 , Issue.12 , pp. 162
  • 2
    • 85025425682 scopus 로고    scopus 로고
    • Art Technology Group
    • Atg dynamo e-business platform. http://www.atg.com/products.
    • Art Technology Group. 2001. Atg dynamo e-business platform. http://www.atg.com/products.
    • (2001)
  • 4
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • Mitre Corporation, Bedford, Mass.
    • Bell, D. and Lapadula, L. 1976. Secure computer systems: Unified exposition and multics interpretation. Tech. Rep. MTR 2997. Mitre Corporation, Bedford, Mass.
    • (1976) Tech. Rep. MTR 2997.
    • Bell, D.1    Lapadula, L.2
  • 5
    • 0023861504 scopus 로고
    • Concerning“modeling” of computer security
    • (Oakland, Calif. Apr. 18-21). IEEE Computer Society Press, Los Alamitos, Calif
    • Bell, D. E. 1988. Concerning“modeling” of computer security. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif. Apr. 18-21). IEEE Computer Society Press, Los Alamitos, Calif.
    • (1988) Proceedings of the IEEE Symposium on Security and Privacy
    • Bell, D.E.1
  • 7
    • 84937540415 scopus 로고    scopus 로고
    • Identity management based on P3P
    • H. Federrath, Ed. Lecture Notes in Computer Science Springer-Verlag, Berlin-Heidelberg, Germany
    • Berthold, O. and Kohntopp (Hansen), M. 2001. Identity management based on P3P. In Anonymity 2000, H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin-Heidelberg, Germany, 141-160.
    • (2001) Anonymity 2000 , vol.2009 , pp. 141-160
    • Berthold, O.1    Kohntopp (Hansen), M.2
  • 8
    • 85025394737 scopus 로고    scopus 로고
    • Etrust Internet Privacy Study: Summary of Market Survey Results
    • Boston Consulting Group.
    • Boston Consulting Group. 1997. Etrust Internet Privacy Study: Summary of Market Survey Results. Tech. rep.
    • (1997) Tech. rep.
  • 9
    • 1142280648 scopus 로고    scopus 로고
    • Boston Consulting Group. Shop. org, http://www.shop. org
    • Boston Consulting Group. 2002. The State of Retailing Online 5.0. Shop. org, http://www.shop. org.
    • (2002) The State of Retailing Online 5.0.
  • 10
    • 0024663219 scopus 로고
    • The chinese wall security policy
    • (Oakland, Calif., May 1-3). IEEE Computer Society Press, Los Alamitos, Calif.
    • Brewer, D. F. and Nash, M. J. 1989. The chinese wall security policy. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 1-3). IEEE Computer Society Press, Los Alamitos, Calif., 206-214.
    • (1989) Proceedings of the IEEE Symposium on Security and Privacy , pp. 206-214
    • Brewer, D.F.1    Nash, M.J.2
  • 11
    • 0002784640 scopus 로고    scopus 로고
    • Methods and techniques of adaptive hypermedia
    • P. Brusilovsky, A. Kobsa, and J. Vassileva, Eds. Kluwer Academic Publishers, Dordrecht, Netherlands
    • Brusilovsky, P. 1998. Methods and techniques of adaptive hypermedia. In Adaptive Hypertext and Hypermedia, P. Brusilovsky, A. Kobsa, and J. Vassileva, Eds. Kluwer Academic Publishers, Dordrecht, Netherlands, 1-43.
    • (1998) Adaptive Hypertext and Hypermedia , pp. 1-43
    • Brusilovsky, P.1
  • 12
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D. L. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2, 84-88.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 13
    • 0001533447 scopus 로고
    • Acquiring user models
    • Chin, D. N. 1993. Acquiring user models. Artif. Intel. Rev. 7, 3-4, 185-197.
    • (1993) Artif. Intel. Rev. , vol.7 , Issue.3-4 , pp. 185-197
    • Chin, D.N.1
  • 14
    • 0035480037 scopus 로고    scopus 로고
    • Identity management and its support of multilateral security
    • Claub, S. and Kohntopp (Hansen), M. 2001. Identity management and its support of multilateral security. Computer Netw. 37, 205-219.
    • (2001) Computer Netw. , vol.37 , pp. 205-219
    • Claub, S.1    Kohntopp (Hansen), M.2
  • 15
    • 0032017696 scopus 로고    scopus 로고
    • Speech acts, electronic commerce, and KQML
    • Covington, M. A. 1998. Speech acts, electronic commerce, and KQML. Deci. Supp. Syst. 22, 3, 203-211.
    • (1998) Deci. Supp. Syst. , vol.22 , Issue.3 , pp. 203-211
    • Covington, M.A.1
  • 16
    • 85025397651 scopus 로고    scopus 로고
    • A P3P preference exchange language 1.0 (APPEL 1.0): W3C working draft 15 April 2002. http://www.w3.org/tr/p3p-preferences/World Wide Web Consortium.
    • Cranor, L., Langheinrich, M., and Marchiori, M. 2002a. A P3P preference exchange language 1.0 (APPEL 1.0): W3C working draft 15 April 2002. http://www.w3.org/tr/p3p-preferences/World Wide Web Consortium.
    • (2002)
    • Cranor, L.1    Langheinrich, M.2    Marchiori, M.3
  • 17
    • 85025421598 scopus 로고    scopus 로고
    • The platform for privacy preferences 1.0 (P3P1.0) specification: W3C recommendation 16 April 2002. http://www.w3.org/tr/p3p/, World Wide Web Consortium.
    • Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., and Reagle, J. 2002b. The platform for privacy preferences 1.0 (P3P1.0) specification: W3C recommendation 16 April 2002. http://www.w3.org/tr/p3p/, World Wide Web Consortium.
    • (2002)
    • Cranor, L.1    Langheinrich, M.2    Marchiori, M.3    Presler-Marshall, M.4    Reagle, J.5
  • 18
    • 0003582713 scopus 로고    scopus 로고
    • Beyond concern: Understanding net users' attitudes about online privacy.
    • Att labs-research technical report TR 99.4.3, http://www.research.att.eom/library/trs/trs/99/99.4/.
    • Cranor, L. F., Reagle, J., and Ackerman, M. S. 1999. Beyond concern: Understanding net users' attitudes about online privacy. Att labs-research technical report TR 99.4.3, http://www.research.att.eom/library/trs/trs/99/99.4/.
    • (1999)
    • Cranor, L.F.1    Reagle, J.2    Ackerman, M.S.3
  • 19
    • 0005927431 scopus 로고    scopus 로고
    • Model Code for the Protection of Personal Information
    • CSA Canadian Standards Association. http://www.csa.ca/standards/privacy/code/.
    • CSA 1996. Model Code for the Protection of Personal Information. Tech. rep., Canadian Standards Association. http://www.csa.ca/standards/privacy/code/.
    • (1996) Tech. rep.
  • 21
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D. E. 1976. A lattice model of secure information flow. Commun. ACM 19, 5, 236-243.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 23
    • 3042807227 scopus 로고    scopus 로고
    • Aarp national survey on consumer preparedness and e-commerce: A survey of computer users age 45 and olDer
    • Aarp, Washington, D.C.
    • Depallo, M. 2000. Aarp national survey on consumer preparedness and e-commerce: A survey of computer users age 45 and olDer. Tech. rep., Aarp, Washington, D.C.
    • (2000) Tech. rep.
    • Depallo, M.1
  • 25
    • 85025406488 scopus 로고
    • EC Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.
    • EC 1995. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities of 23 November 1995 No L. 281.
    • (1995) Official Journal of the European Communities of 23 November 1995 No L. 281.
  • 26
    • 85025403520 scopus 로고    scopus 로고
    • EC Directive 2002/58/EC of the European Parliament and of the Council of 24 october 1995 Concerning the Processingof Personal Data and the Protection of Privacy in the Electronic Communications Sector.
    • EC 2002. Directive 2002/58/EC of the European Parliament and of the Council of 24 october 1995 Concerning the Processingof Personal Data and the Protection of Privacy in the Electronic Communications Sector. Official Journal of the European Communities of 31 July 2002 No L 201/37.
    • (2002) Official Journal of the European Communities of 31 July 2002 No L 201/37.
  • 27
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation wIthin a corporate intranet
    • Ferraiolo, D. F., Barkley, J. F., and Kuhn, D. R. 1999. A role-based access control model and reference implementation wIthin a corporate intranet. ACM Trans. Inf. Syst. Sec. 2, 1, 34-64.
    • (1999) ACM Trans. Inf. Syst. Sec. , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 28
    • 0003993042 scopus 로고
    • Draft specification of the Kqml agent-communication language
    • Finin, T. and Weber, J. 1993. Draft specification of the Kqml agent-communication language. Tech. Rep.
    • (1993) Tech. Rep.
    • Finin, T.1    Weber, J.2
  • 29
    • 0002712081 scopus 로고
    • Gums-A general user modeling shell
    • A. Kobsa and W. Wahlster, Eds. Springer, Berlin, Heidelberg, New York
    • Finin, T. W. 1989. Gums-A general user modeling shell. In User Models in Dialog Systems, A. Kobsa and W. Wahlster, Eds. Springer, Berlin, Heidelberg, New York, 411-430.
    • (1989) User Models in Dialog Systems , pp. 411-430
    • Finin, T.W.1
  • 30
    • 0004323627 scopus 로고    scopus 로고
    • User modeling servers: Requirements, design, and evaluation
    • Ph.D. dissertation, Department of Mathematics and Computer Science, University of Essen, Germany.
    • Fink, J. 2003. User modeling servers: Requirements, design, and evaluation. Ph.D. dissertation, Department of Mathematics and Computer Science, University of Essen, Germany.
    • (2003)
    • Fink, J.1
  • 31
    • 0034484385 scopus 로고    scopus 로고
    • A review and analysis of commercial user modeling servers for personalization on the world wide web
    • http://www.ics.uci.edu/~kobsa/papers/2000-UMUAI-kobsa.pdf.
    • Fink, J. and Kobsa, A. 2000. A review and analysis of commercial user modeling servers for personalization on the world wide web. User Mod. User-Adapted Interact. 10, 3-4, 209-249. http://www.ics.uci.edu/~kobsa/papers/2000-UMUAI-kobsa.pdf.
    • (2000) User Mod. User-Adapted Interact. , vol.10 , Issue.3-4 , pp. 209-249
    • Fink, J.1    Kobsa, A.2
  • 32
    • 0036723093 scopus 로고    scopus 로고
    • User Modeling in personalized city tours
    • http://www.ics.uci.edu/~kobsa/papers/2002-AIR-kobsa.pdf.
    • Fink, J. and Kobsa, A. 2002. User Modeling in personalized city tours. Artif. Intel. Rev. 18, 1, 33-74.http://www.ics.uci.edu/~kobsa/papers/2002-AIR-kobsa.pdf.
    • (2002) Artif. Intel. Rev. , vol.18 , Issue.1 , pp. 33-74
    • Fink, J.1    Kobsa, A.2
  • 33
    • 0032260316 scopus 로고    scopus 로고
    • Adaptable and adaptive information provision for all users, including disabled and elderly people
    • Taylor Graham, London http://www.ics.uci.edu/~kobsa/papers/1998-Nrhm-kobsa.pdf.
    • Fink, J., Kobsa, A., and Nill, A. 1998. Adaptable and adaptive information provision for all users, including disabled and elderly people. In New Review of Hypermedia and Multimedia 4. Taylor Graham, London, 163-188. http://www.ics.uci.edu/~kobsa/papers/1998-Nrhm-kobsa.pdf.
    • (1998) New Review of Hypermedia and Multimedia 4. , pp. 163-188
    • Fink, J.1    Kobsa, A.2    Nill, A.3
  • 34
    • 0012749622 scopus 로고    scopus 로고
    • Putting personalization into practice
    • Fink, J., Koenemann, J., Noller, S., and Schwab, I. 2002. Putting personalization into practice. Commun. ACM 45, 5, 41-42.
    • (2002) Commun. ACM , vol.45 , Issue.5 , pp. 41-42
    • Fink, J.1    Koenemann, J.2    Noller, S.3    Schwab, I.4
  • 37
    • 0003745794 scopus 로고    scopus 로고
    • Trust and privacy online: Why Americans want to rewrite the rules
    • The Pew Internet & American Life Project, Washington, D.C.
    • FOX, S. 2000. Trust and privacy online: Why Americans want to rewrite the rules. Tech. rep. The Pew Internet & American Life Project, Washington, D.C.
    • (2000) Tech. rep.
    • FOX, S.1
  • 38
    • 0004249393 scopus 로고    scopus 로고
    • The SSL protocol
    • version 3.0. Tech. rep., Netscape Communications Company.
    • Freier, A. O., Karlton, P., and Kocher, P. C. 1996. The SSL protocol, version 3.0. Tech. rep., Netscape Communications Company.
    • (1996)
    • Freier, A.O.1    Karlton, P.2    Kocher, P.C.3
  • 40
    • 0003317098 scopus 로고    scopus 로고
    • How to make personalized web browsing simple, secure, and anonymous
    • (Anguilla, British West Indies, February 24-28). R. Hirschfeld, Ed. Springer-Verlag, New York
    • Gabber, E., Gibbons, P. B., Matias, Y, and Mayer, A. 1997. How to make personalized web browsing simple, secure, and anonymous. In Financial Cryptography, Proceedings of the 1st International Conference (FC'97) (Anguilla, British West Indies, February 24-28). R. Hirschfeld, Ed. Springer-Verlag, New York, 17-31.
    • (1997) Financial Cryptography, Proceedings of the 1st International Conference (FC'97) , pp. 17-31
    • Gabber, E.1    Gibbons, P.B.2    Matias, Y.3    Mayer, A.4
  • 41
    • 0032180215 scopus 로고    scopus 로고
    • Anonymous mechanisms in group decision support systems communication
    • Gavish, B. and Gerdes, J. H. 1998. Anonymous mechanisms in group decision support systems communication. Dec. Supp. Syst. 23, 4, 297-328.
    • (1998) Dec. Supp. Syst. , vol.23 , Issue.4 , pp. 297-328
    • Gavish, B.1    Gerdes, J.H.2
  • 42
    • 0020299523 scopus 로고
    • Security policies and security models
    • (Oakland, Calif., Apr. 26-28). IEEE Computer Society Press, Los Alamitos, Calif.
    • Goguen, J. and Meseguer, J. 1982. Security policies and security models. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., Apr. 26-28). IEEE Computer Society Press, Los Alamitos, Calif., 11-20.
    • (1982) Proceedings of the IEEE Symposium on Security and Privacy , pp. 11-20
    • Goguen, J.1    Meseguer, J.2
  • 43
    • 0021177508 scopus 로고
    • Unwinding and inference control
    • (Oakland, Calif., Apr. 29-May 2). IEEE Computer Society Press, Los Alamitos, Calif.
    • Goguen, J. A. and Meseguer, J. 1984. Unwinding and inference control. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., Apr. 29-May 2). IEEE Computer Society Press, Los Alamitos, Calif., 75-86.
    • (1984) Proceedings of the IEEE Symposium on Security and Privacy , pp. 75-86
    • Goguen, J.A.1    Meseguer, J.2
  • 44
    • 0005063385 scopus 로고    scopus 로고
    • Onion Routing for anonymous and private internet connections
    • Goldschlag, D., Reed, M., and Syverson, P. 1999. Onion Routing for anonymous and private internet connections. Commun. ACM 42, 2, 39-41.
    • (1999) Commun. ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 46
    • 0004126159 scopus 로고    scopus 로고
    • GVU Graphics, Visualization, & Usability Center, College of Computing, Georgia Institute of Technology, Atlanta, Ga. http://www.cc. gatech.edu/gvu/user_surveys/survey-1998-10/.
    • GVU 1998. GVU's tenth WWW user survey. Tech. rep., Graphics, Visualization, & Usability Center, College of Computing, Georgia Institute of Technology, Atlanta, Ga. http://www.cc. gatech.edu/gvu/user_surveys/survey-1998-10/.
    • (1998) GVU's tenth WWW user survey. Tech. rep.
  • 47
    • 85025397747 scopus 로고    scopus 로고
    • Introducing SSL and certificates using SSLeay
    • HIRSCH, F. J. 1997. Introducing SSL and certificates using SSLeay. WWW J., 141-173.
    • (1997) WWW J. , pp. 141-173
    • HIRSCH, F.J.1
  • 48
    • 0010834145 scopus 로고    scopus 로고
    • IBM multi-national consumer privacy survey
    • IBM http://www.ibm.com/services/files/privacy_survey_oct991.pdf.
    • IBM. 1999. IBM multi-national consumer privacy survey, http://www.ibm.com/services/files/privacy_survey_oct991.pdf.
    • (1999)
  • 51
    • 0033905512 scopus 로고    scopus 로고
    • Jatlite: A java agent infrastructure with message routing
    • Jeon, H., Petrie, C., and Cutkosky, M. R. 2000. Jatlite: A java agent infrastructure with message routing. IEEE Inter. Comput. 4, 2, 87-96.
    • (2000) IEEE Inter. Comput. , vol.4 , Issue.2 , pp. 87-96
    • Jeon, H.1    Petrie, C.2    Cutkosky, M.R.3
  • 52
    • 85025396306 scopus 로고    scopus 로고
    • Generalisation and security-improvement of mix-mediated anonymous communication
    • Ph.D. dissertation. Department of Computer Science, Dresden University of Technology, Dresden Germany.
    • Jerichow, A. 1999. Generalisation and security-improvement of mix-mediated anonymous communication. Ph.D. dissertation. Department of Computer Science, Dresden University of Technology, Dresden Germany.
    • (1999)
    • Jerichow, A.1
  • 53
    • 0008946659 scopus 로고
    • Building a user model implicitly from a cooperative advisory dialog
    • Kass, R. 1991. Building a user model implicitly from a cooperative advisory dialog. User Mod. User-Adapted Interact. 1, 3, 203-258.
    • (1991) User Mod. User-Adapted Interact. , vol.1 , Issue.3 , pp. 203-258
    • Kass, R.1
  • 54
    • 0028717841 scopus 로고
    • The um toolkit for cooperative user modelling
    • Kay, J. 1995. The um toolkit for cooperative user modelling. User Mod. User-Adapted Interact. 4, 3, 149-196.
    • (1995) User Mod. User-Adapted Interact. , vol.4 , Issue.3 , pp. 149-196
    • Kay, J.1
  • 56
    • 84957649548 scopus 로고    scopus 로고
    • Identity escrow
    • (Santa Barbara, Calif.), H. Krawczyk, Ed. Lecture Notes in Computer Science Springer-Verlag, Berlin, Heidelberg, New York
    • Kilian, J. and Petrank, E. 1998. Identity escrow. In Advances in Cryptology (CRYPTO '98) (Santa Barbara, Calif.), H. Krawczyk, Ed. Lecture Notes in Computer Science, vol 1462. Springer-Verlag, Berlin, Heidelberg, New York, 169-185.
    • (1998) Advances in Cryptology (CRYPTO '98) , vol.1462 , pp. 169-185
    • Kilian, J.1    Petrank, E.2
  • 57
    • 0003285757 scopus 로고
    • User modeling: Recent work, prospects and hazards
    • T. K. M. Schneider-Hufschmidt and U. Malinowski, Eds. North-Holland, Amsterdam, The Netherlands
    • Kobsa, A. 1993. User modeling: Recent work, prospects and hazards. In Adaptive User Interfaces: Principles and Practice, T. K. M. Schneider-Hufschmidt and U. Malinowski, Eds. North-Holland, Amsterdam, The Netherlands, 111-128.
    • (1993) Adaptive User Interfaces: Principles and Practice , pp. 111-128
    • Kobsa, A.1
  • 58
    • 0035042834 scopus 로고    scopus 로고
    • Generic user modeling systems
    • http://www.ics.uci.edu/~kobsa/papers/2001-UMUAI-kobsa.pdf.
    • Kobsa, A. 2001a. Generic user modeling systems. User Mod. User-Adapted Interact. 11, 1-2, 49-63. http://www.ics.uci.edu/~kobsa/papers/2001-UMUAI-kobsa.pdf.
    • (2001) User Mod. User-Adapted Interact. , vol.11 , Issue.1-2 , pp. 49-63
    • Kobsa, A.1
  • 59
    • 84943145987 scopus 로고    scopus 로고
    • Tailoring privacy to users' needs (invited keynote)
    • M. Bauer, P. J. Gmytrasiewicz, and J. Vassileva, Eds. Springer, Berlin, Heidelberg, New York http://www.ics.uci.edu/kobsa/papers/2001-UM01-kobsa.pdf.
    • Kobsa, A. 2001b. Tailoring privacy to users' needs (invited keynote). In User Modeling 2001: 8th International Conference, M. Bauer, P. J. Gmytrasiewicz, and J. Vassileva, Eds. Springer, Berlin, Heidelberg, New York, 303-313. http://www.ics.uci.edu/kobsa/papers/2001-UM01-kobsa.pdf.
    • (2001) User Modeling 2001: 8th International Conference , pp. 303-313
    • Kobsa, A.1
  • 60
    • 0347164897 scopus 로고    scopus 로고
    • Personalized hypermedia and international privacy
    • http://www.ics.uci.edu/~kobsa/papers/2002-CACM-kobsa.pdf
    • Kobsa, A. 2002. Personalized hypermedia and international privacy. Commun. ACM 45, 5, 64-67. http://www.ics.uci.edu/~kobsa/papers/2002-CACM-kobsa.pdf.
    • (2002) Commun. ACM , vol.45 , Issue.5 , pp. 64-67
    • Kobsa, A.1
  • 61
    • 0001290002 scopus 로고    scopus 로고
    • Personalized Hypermedia presentation techniques for improving online customer relationships
    • http://www.ics.uci.edu/~kobsa/papers/2001-KER-kobsa.pdf.
    • Kobsa, A., Koenemann, J., and Pohl, W. 2001. Personalized Hypermedia presentation techniques for improving online customer relationships. The Knowl. Eng. Rev. 16, 2, 111-155. http://www.ics.uci.edu/~kobsa/papers/2001-KER-kobsa.pdf.
    • (2001) The Knowl. Eng. Rev. , vol.16 , Issue.2 , pp. 111-155
    • Kobsa, A.1    Koenemann, J.2    Pohl, W.3
  • 62
    • 0028754858 scopus 로고
    • The user modeling shell system BGP-MS
    • Kobsa, A. and Pohl, W. 1995. The user modeling shell system BGP-MS. User Mod. User-Adapted Interact. 4, 2, 59-106.
    • (1995) User Mod. User-Adapted Interact. , vol.4 , Issue.2 , pp. 59-106
    • Kobsa, A.1    Pohl, W.2
  • 63
    • 33747137086 scopus 로고    scopus 로고
    • A standard for the performatives in the communication between applications and user modeling systems (draft)
    • http://www.ics.uci.edu/~kobsa/papers/1996-kobsa-pohl-fink-rfc.pdf.
    • Kobsa, A., Pohl, W., and Fink, J. 1996. A standard for the performatives in the communication between applications and user modeling systems (draft). http://www.ics.uci.edu/~kobsa/papers/1996-kobsa-pohl-fink-rfc.pdf.
    • (1996)
    • Kobsa, A.1    Pohl, W.2    Fink, J.3
  • 64
    • 0003693565 scopus 로고    scopus 로고
    • Computer Science and Electrical Engineering Department, University of Maryland, Baltimore County, Md.
    • Labrou, Y. and Finin, T. 1997. A proposal for a new Kqml specification. Tech. rep., Computer Science and Electrical Engineering Department, University of Maryland, Baltimore County, Md.
    • (1997) A proposal for a new Kqml specification. Tech. rep.
    • Labrou, Y.1    Finin, T.2
  • 66
    • 84943617219 scopus 로고    scopus 로고
    • One for all and all in one: A learner modelling server in a multi-agent platform
    • (Banff, Canada, June 20-24), J. Kay, Ed. Springer-Verlag, Wien, New York
    • Machado, I., Martins, A., and Paiva, A. 1999. One for all and all in one: A learner modelling server in a multi-agent platform. In User Modeling, Proceedings of the 7th International Conference (UM99) (Banff, Canada, June 20-24), J. Kay, Ed. Springer-Verlag, Wien, New York, 211-221.
    • (1999) User Modeling, Proceedings of the 7th International Conference (UM99) , pp. 211-221
    • Machado, I.1    Martins, A.2    Paiva, A.3
  • 67
    • 85025424167 scopus 로고    scopus 로고
    • Frontmind. http://www.mannainc.com/products.html.
    • Manna. 2001. Frontmind. http://www.mannainc.com/products.html.
    • (2001) Manna.
  • 69
    • 85025380699 scopus 로고    scopus 로고
    • Net Perceptions. http://www.netperceptions.com.
    • Net Perceptions. 2002. Net Perceptions. http://www.netperceptions.com.
    • (2002) Net Perceptions.
  • 70
    • 84943172279 scopus 로고    scopus 로고
    • Self-regulatory principles for online preference marketing by network advisers. http://www.ftc.gov/os/2000/07/nai 7-10 final.pdf.
    • Network Advertising Initiative. 2000. Self-regulatory principles for online preference marketing by network advisers. http://www.ftc.gov/os/2000/07/nai 7-10 final.pdf.
    • (2000) Network Advertising Initiative.
  • 72
    • 0028737501 scopus 로고
    • Heterogeneous learning in the Doppelganger user modeling system
    • Orwant, J. 1995. Heterogeneous learning in the Doppelganger user modeling system. User Mod. User-Adapted Interact. 4, 2, 107-130.
    • (1995) User Mod. User-Adapted Interact. , vol.4 , Issue.2 , pp. 107-130
    • Orwant, J.1
  • 73
    • 0000546828 scopus 로고
    • Tagus-A user and learner modeling workbench
    • Paiva, A. and Self, J. 1995. Tagus-A user and learner modeling workbench. User Mod. User-Adapted Interact. 4, 3197-226.
    • (1995) User Mod. User-Adapted Interact. , vol.4 , pp. 3197-3226
    • Paiva, A.1    Self, J.2
  • 74
    • 38849201595 scopus 로고    scopus 로고
    • Personalization Consortium
    • Personalization & Privacy Survey. Tech. Rep. Personalization Consortium, Edgewater Place, Mass, http://www.personalization.org/SurveyResults.pdf.
    • Personalization Consortium. 2000. Personalization & Privacy Survey. Tech. Rep. Personalization Consortium, Edgewater Place, Mass, http://www.personalization.org/SurveyResults.pdf.
    • (2000)
  • 75
    • 0030382065 scopus 로고    scopus 로고
    • Agent-based engineering, the web, and intelligence
    • Petrie, C. J. 1996. Agent-based engineering, the web, and intelligence. Ieee Expert 11, 6, 24-29.
    • (1996) Ieee Expert , vol.11 , Issue.6 , pp. 24-29
    • Petrie, C.J.1
  • 76
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity: A proposal for terminology
    • H. Federrath, Ed. Lecture Notes in Computer Science Springer-Verlag, Berlin-Heidelberg, Germany
    • Pfitzmann, A. and Kohntopp (Hansen), M. 2001. Anonymity, unobservability, and pseudonymity: A proposal for terminology. In Anonymity 2000, H. Federrath, Ed. Lecture Notes in Computer Science, vol. 2009. Springer-Verlag, Berlin-Heidelberg, Germany, 1-9.
    • (2001) Anonymity 2000 , vol.2009 , pp. 1-9
    • Pfitzmann, A.1    Kohntopp (Hansen), M.2
  • 79
    • 0039084976 scopus 로고
    • An economic theory of privacy
    • F. Schoeman, Ed. Cambridge University Press
    • Posner, R. A. 1984. An economic theory of privacy. In Philosophical Dimensions of Privacy, F. Schoeman, Ed. Cambridge University Press, 333-345.
    • (1984) Philosophical Dimensions of Privacy , pp. 333-345
    • Posner, R.A.1
  • 81
    • 0002265410 scopus 로고    scopus 로고
    • The platform for privacy preferences
    • Reagle, J. and Cranor, L. F. 1999. The platform for privacy preferences. Commun. ACM 42, 2, 48-55.
    • (1999) Commun. ACM , vol.42 , Issue.2 , pp. 48-55
    • Reagle, J.1    Cranor, L.F.2
  • 83
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with crowds
    • Reiter, M. K. and Rubin, A. D. 1999. Anonymous web transactions with crowds. Commun. ACM 42, 2, 32-38.
    • (1999) Commun. ACM , vol.42 , Issue.2 , pp. 32-38
    • Reiter, M.K.1    Rubin, A.D.2
  • 85
    • 0018632276 scopus 로고
    • User modeling via stereotypes
    • Rich, E. 1979b. User modeling via stereotypes. Cogn. Sci. 3, 329-354.
    • (1979) Cogn. Sci. , vol.3 , pp. 329-354
    • Rich, E.1
  • 86
    • 0020718591 scopus 로고
    • Users are individuals: Individualizing user models
    • Rich, E. 1983. Users are individuals: Individualizing user models. Int. J. Man-Machine Stud. 18, 199-214.
    • (1983) Int. J. Man-Machine Stud. , vol.18 , pp. 199-214
    • Rich, E.1
  • 90
    • 0009979605 scopus 로고    scopus 로고
    • Kluwer Academic Publishers, Dordrecht, Netherlands. http://www.security-and-privacy-in-user-modeling.info
    • Schreck, J. 2003. Security and Privacy in User Modeling. Kluwer Academic Publishers, Dordrecht, Netherlands. http://www.security-and-privacy-in-user-modeling.info.
    • (2003) Security and Privacy in User Modeling.
    • Schreck, J.1
  • 92
    • 0022098253 scopus 로고
    • Umfe: A User Modelling Front-End Subsystem
    • Sleeman, D. 1985. Umfe: A User Modelling Front-End Subsystem. Inter. J. Man-Machine Stud. 23, 71-88.
    • (1985) Inter. J. Man-Machine Stud. , vol.23 , pp. 71-88
    • Sleeman, D.1
  • 95
    • 0030676973 scopus 로고    scopus 로고
    • Anonymous connections and onion routing
    • (Oakland, Calif., May 4-7). IEEE Computer Society Press, Los Alamitos, Calif.
    • Syverson, P. F., Goldschlag, D. M., and Reed, M. G. 1997. Anonymous connections and onion routing. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 4-7). IEEE Computer Society Press, Los Alamitos, Calif., 44-54.
    • (1997) Proceedings of the IEEE Symposium on Security and Privacy , pp. 44-54
    • Syverson, P.F.1    Goldschlag, D.M.2    Reed, M.G.3
  • 99
    • 0042648867 scopus 로고    scopus 로고
    • E-commerce & privacy: What net users want
    • http://www.pwcglobal.com/gx/eng/svcs/privAcy/images/e-commerce.pdf.
    • Westin, A. F. and Maurici, D. 1998. E-commerce & privacy: What net users want. http://www.pwcglobal.com/gx/eng/svcs/privAcy/images/e-commerce.pdf.
    • (1998)
    • Westin, A.F.1    Maurici, D.2
  • 100
    • 0011086762 scopus 로고    scopus 로고
    • Empowering users to set their security goals
    • G. Mller and K. Rannenberg, Eds. Addison-Wesley-Longman, Berlin-Heidelberg, Germany
    • Wolf, G. and Pfitzmann, A. 1999. Empowering users to set their security goals. In Multilateral Security for Global Communication-Technology, Application, Business, G. Mller and K. Rannenberg, Eds. Addison-Wesley-Longman, Berlin-Heidelberg, Germany, 113-135.
    • (1999) Multilateral Security for Global Communication-Technology, Application, Business , pp. 113-135
    • Wolf, G.1    Pfitzmann, A.2
  • 101
    • 85025384413 scopus 로고    scopus 로고
    • People, their Roles, and their Action Potential in Electronic Environments (in German)
    • Universitat Hohenheim, Germany, 26.-27.3., K. Bauknecht, A. Bullesbach, H. Pohl, and S. Teufel, Eds. Hochschulverlag AG ETH Zurich
    • Zurfluh, U. E. 1998. People, their Roles, and their Action Potential in Electronic Environments (in German). In Sicherheit in Informationssystemen, Proceedings der Fachtagung SIS'98, Universitat Hohenheim, Germany, 26.-27.3., K. Bauknecht, A. Bullesbach, H. Pohl, and S. Teufel, Eds. Hochschulverlag AG ETH Zurich, 43-64.
    • (1998) Sicherheit in Informationssystemen, Proceedings der Fachtagung SIS'98 , pp. 43-64
    • Zurfluh, U.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.