|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11410 occurrences of 3224 keywords
|
|
|
Results
Found 63337 publication records. Showing 63336 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
134 | Gregory Neven |
Privacy-enhanced access control in primelife. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010, pp. 1-2, 2010, ACM, 978-1-4503-0090-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
98 | Julia Gideon, Lorrie Faith Cranor, Serge Egelman, Alessandro Acquisti |
Power strips, prophylactics, and privacy, oh my! ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 133-144, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
e-commerce, user studies, search engines, privacy policies, P3P |
83 | Lorrie Faith Cranor, Praveen Guduru, Manjula Arjula |
User interfaces for privacy agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Hum. Interact. ![In: ACM Trans. Comput. Hum. Interact. 13(2), pp. 135-178, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, preferences, privacy policy, P3P, privacy enhancing technology, user agent |
75 | Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor, Alessandro Acquisti |
Timing is everything?: the effects of timing and placement of online privacy indicators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 319-328, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
website indicators, privacy, timing, mental models, privacy policies, usable privacy and security |
75 | Yi Ren, Min Luo, Zukai Tang, Lingqing Ye |
A Composite Privacy Protection Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 380-395, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy Data Model, Privacy Database, Deputy Mechanism, Privacy Protection |
71 | Chris Vanden Berghe, Matthias Schunter |
Privacy Injector - Automated Privacy Enforcement Through Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 99-117, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
71 | Sampson Pun, Ken Barker 0001 |
Privacy FP-Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA Workshops ![In: Database Systems for Advanced Applications, DASFAA 2009 International Workshops: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD, Brisbane, Australia, April 20-23, 2009, pp. 246-260, 2009, Springer, 978-3-642-04204-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Anonymized privacy, Privacy, Database, FP-Tree, Personalized privacy |
69 | Marco Casassa Mont, Robert Thyne |
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 118-134, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy-aware access control, obligation management, privacy, identity management, policy enforcement |
69 | Hector Ouilhet |
Google Sky Map: using your phone as an interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile HCI ![In: Proceedings of the 12th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2010, Lisbon, Portugal, September 7-10, 2010, pp. 419-422, 2010, ACM, 978-1-60558-835-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
69 | Rajiv T. Maheswaran, Jonathan P. Pearce, Emma Bowring, Pradeep Varakantham, Milind Tambe |
Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Agents Multi Agent Syst. ![In: Auton. Agents Multi Agent Syst. 13(1), pp. 27-60, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Distributed constraint reasoning, Privacy, Distributed constraint optimization |
68 | George O. M. Yee |
A privacy controller approach for privacy protection in web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007, pp. 44-51, 2007, ACM, 978-1-59593-892-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy controller, user privacy policy, web services, privacy protection |
67 | Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis |
Addressing privacy requirements in system design: the PriS method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 13(3), pp. 241-255, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy-process patterns, Formal methods, Requirements engineering, System design, Privacy enhancing technologies, Goal-oriented approach, Privacy requirements |
66 | Ryan Babbitt, Hen-I Yang, Johnny S. Wong, Carl K. Chang |
Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOST ![In: Ambient Assistive Health and Wellness Management in the Heart of the City, 7th International Conference on Smart Homes and Health Telematics, ICOST 2009, Tours, France, July 1-3, 2009. Proceedings, pp. 166-173, 2009, Springer, 978-3-642-02867-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
physical privacy, privacy model, E-P3P, privacy, pervasive computing, P3P, information privacy |
66 | Angela Cristina Duta, Ken Barker 0001 |
P4A: A New Privacy Model for XML. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 65-80, 2008, Springer, 978-3-540-70566-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy statement, flexible privacy policy, privacy map, privacy preference |
66 | Yan Tang, Robert Meersman |
Judicial Support Systems: Ideas for a Privacy Ontology-Based Case Analyzer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, GADA, MIOS+INTEROP, ORM, PhDS, SeBGIS, SWWS, and WOSE 2005, Agia Napa, Cyprus, October 31 - November 4, 2005, Proceedings, pp. 800-807, 2005, Springer, 3-540-29739-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Privacy ontology, Woolf reforms, privacy principles, privacy directives, privacy ontology structure |
65 | Michelle Kwasny, Kelly E. Caine, Wendy A. Rogers, Arthur D. Fisk |
Privacy and technology: folk definitions and perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, Florence, Italy, April 5-10, 2008, pp. 3291-3296, 2008, ACM, 978-1-60558-012-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
focus group methodology, privacy, gender differences, age differences |
64 | Yanjun Zuo, Timothy O'Keefe |
Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 9(5), pp. 451-467, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Information privacy protection, Privacy violation detection, Privacy-enhanced operating system, Information post-release control |
63 | Günter Karjoth, Matthias Schunter, Michael Waidner |
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 69-84, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
63 | Janice Warner, Soon Ae Chun |
A citizen privacy protection model for e-government mashup services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 9th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2008, Montreal, Canada, May 18-21, 2008, pp. 188-196, 2008, Digital Government Research Center, 978-1-60558-099-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
citizen privacy, e-government mashup services, personal privacy policy network, regulatory privacy policy, web 2.0 |
62 | Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai |
Orthogonality between Key Privacy and Data Privacy, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 313-327, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Sarah Spiekermann, Jens Grossklags, Bettina Berendt |
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), Tampa, Florida, USA, October 14-17, 2001, pp. 38-47, 2001, ACM, 1-58113-387-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
automated shopping and trading, marketing and advertising technology, user interface and interaction design, privacy, legal issues, social implications |
61 | Lorrie Faith Cranor, Manjula Arjula, Praveen Guduru |
Use of a P3P user agent by early adopters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002, pp. 1-10, 2002, ACM, 1-58113-633-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
privacy, user study, survey, P3P, user agent |
60 | Jan Porekar, Aljosa Jerman-Blazic, Tomaz Klobucar |
Towards Organizational Privacy Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: Second International Conference on the Digital Society (ICDS 2008), February 10-15, 2008, Sainte Luce, Martinique, France, pp. 15-19, 2008, IEEE Computer Society, 978-0-7695-3087-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PET – privacy enhancing technologies, privacy, patterns |
60 | Rhys Smith, Jianhua Shao 0001 |
Privacy and e-commerce: a consumer-centric perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 7(2), pp. 89-116, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy, E-commerce, Privacy enhancing technology |
59 | Yuan Tian 0003, Biao Song, Eui-nam Huh |
Relationship Based Privacy Management for Ubiquitous Society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part I, pp. 853-867, 2009, Springer, 978-3-642-02453-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy Data Graph, Privacy, Role Based Access Control, Privacy Preference |
59 | Peter Bodorik, Dawn N. Jutla, Mike Xuehai Wang |
Consistent privacy preferences (CPP): model, semantics, and properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2368-2375, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
P3P agent, rule-set consistency, semantic web privacy, user privacy control, consistency, P3P, privacy preferences |
59 | Josep Domingo-Ferrer |
A Three-Dimensional Conceptual Framework for Database Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 193-202, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Statistical database privacy, Security and privacy of electronic health records, Privacy-preserving data mining, Private information retrieval |
58 | Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor |
A Comparative Study of Online Privacy Policies and Formats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 37-55, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
57 | Kambiz Ghazinour, Maryam Majedi, Ken Barker 0001 |
A Lattice-Based Privacy Aware Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 154-159, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
57 | Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal Öztürk |
Enhancing Source-Location Privacy in Sensor Network Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 25th International Conference on Distributed Computing Systems (ICDCS 2005), 6-10 June 2005, Columbus, OH, USA, pp. 599-608, 2005, IEEE Computer Society, 0-7695-2331-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter |
E-P3P privacy policies and privacy authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002, pp. 103-109, 2002, ACM, 1-58113-633-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
E-P3P, privacy policies, privacy manager |
56 | Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li |
RFID privacy: relation between two notions, minimal condition, and efficient construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 54-65, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, rfid, pseudorandom function |
56 | Rafae Bhatti, Tyrone Grandison |
Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 158-173, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Refinement, Healthcare, Compliance, HIPAA, Privacy Management |
56 | Abdelmounaam Rezgui, Athman Bouguettaya, Mohamed Eltoweissy |
SemWebDL: A privacy-preserving Semantic Web infrastructure for digital libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Libr. ![In: Int. J. Digit. Libr. 4(3), pp. 171-184, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Web services, Privacy, Semantic Web, Digital libraries, Reputation |
56 | Yuan Tian 0003, Biao Song, Eui-nam Huh |
A purpose-based privacy-aware system using privacy data graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 412-416, 2009, ACM, 978-1-60558-659-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy data graph, privacy, role based access control |
56 | Privacy International |
2002 Orwell Awards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CFP ![In: Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, CFP 2002, San Francisco, California, USA, April 16-19, 2002, pp. 14:14, 2002, ACM, 978-1-58113-505-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
55 | Jan Paul Kolter, Thomas Kernchen, Günther Pernul |
Collaborative Privacy - A Community-Based Privacy Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 226-236, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
54 | Simon D. Byers, Lorrie Faith Cranor, David P. Kormann, Patrick D. McDaniel |
Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers, pp. 314-328, 2004, Springer, 3-540-26203-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
54 | Rafael Accorsi |
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 329-339, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Günter Karjoth, Matthias Schunter, Els Van Herreweghen |
Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 135-146, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
53 | Sarah Spiekermann, Lorrie Faith Cranor |
Engineering Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 35(1), pp. 67-82, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
53 | George O. M. Yee |
An Automatic Privacy Policy Agreement Checker for E-services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 307-315, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Rafiy Saleh, Dawn N. Jutla, Peter Bodorik |
Management of Users' Privacy Preferences in Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the IEEE International Conference on Information Reuse and Integration, IRI 2007, 13-15 August 2007, Las Vegas, Nevada, USA, pp. 91-97, 2007, IEEE Systems, Man, and Cybernetics Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, Robert W. Reeder |
A "nutrition label" for privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, 2009, ACM, 978-1-60558-736-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
nutrition label, privacy, user interface, policy, labeling, information design, P3P |
53 | Carolyn Brodie, Clare-Marie Karat, John Karat, Jinjuan Feng |
Usable security and privacy: a case study of developing privacy management tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005, pp. 35-43, 2005, ACM, 1-59593-178-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, design, privacy policies, social and legal issues |
53 | Mina Deng, Lothar Fritsch, Klaus Kursawe |
Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 172-189, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
model for privacy infrastructures, data identification techniques, privacy protection, mobile camera phones |
52 | Clemens Heidinger, Erik Buchmann, Klemens Böhm |
Collaborative data privacy for the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT/ICDT Workshops ![In: Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010, ACM, 978-1-60558-990-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, folksonomies |
52 | Maria Moloney, Frank Bannister |
Online Privacy: Measuring Individuals' Concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 9th International Conference, EC-Web 2008, Turin, Italy, September 3-4, 2008, Proceedings, pp. 21-30, 2008, Springer, 978-3-540-85716-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Internet, Privacy, Trust, Information Systems, Data Security |
52 | Ni (Jenny) Zhang, Chris Todd |
A Privacy Agent in Context-Aware Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 196-205, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Ontology, Ubiquitous Computing, Context-Awareness, Privacy Protection, P3P |
52 | Patrick Gage Kelley |
Designing a privacy label: assisting consumer understanding of online privacy practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009, pp. 3347-3352, 2009, ACM, 978-1-60558-247-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, labeling, information design, privacy policies |
52 | Jason I. Hong, Jennifer D. Ng, Scott Lederer, James A. Landay |
Privacy risk models for designing privacy-sensitive ubiquitous computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Conference on Designing Interactive Systems ![In: Proceedings of the Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, Cambridge, MA, USA, August 1-4, 2004, pp. 91-100, 2004, ACM, 1-58113-787-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy risk model, privacy, ubiquitous computing |
52 | Toby Xu, Ying Cai |
Feeling-based location privacy protection for location-based services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 348-357, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
feeling-based privacy model, k-anonymity model, trajectory cloaking, location-based services, location privacy |
52 | Arpita Ghosh, Tim Roughgarden, Mukund Sundararajan |
Universally utility-maximizing privacy mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 351-360, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, linear programming, utility, differential privacy |
51 | Ali Khoshgozaran, Cyrus Shahabi |
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Location-Based Applications ![In: Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]., pp. 59-83, 2009, Springer, 978-3-642-03510-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann |
Location Privacy in RFID Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Location-Based Applications ![In: Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]., pp. 127-150, 2009, Springer, 978-3-642-03510-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Andrew S. Patrick, Steve Kenny |
From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers, pp. 107-124, 2003, Springer, 3-540-20610-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
51 | George O. M. Yee, Larry Korba, Ronggong Song |
Cooperative Visualization of Privacy Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDVE ![In: Cooperative Design, Visualization, and Engineering, 5th International Conference, CDVE 2008, Calvià, Mallorca, Spain, September 21-25, 2008, Proceedings, pp. 45-53, 2008, Springer, 978-3-540-88010-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy risks, privacy legislation, privacy compliance, security, e-services, Cooperative visualization |
51 | Kirstie Hawkey |
Exploring a human centered approach to managing visual privacy concerns during collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCC ![In: Proceedings of the 3rd ACM Workshop on Human-Centered Computing, HCC 2008, Vancouver, British Columbia, Canada, October 31, 2008, pp. 69-76, 2008, ACM, 978-1-60558-320-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
incidental information privacy, usable security and privacy, visual privacy, user modeling, web browser, adaptive user interface |
51 | Melissa Dark, Clewin McPherson |
Privacy and the Public Educator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (9) ![In: Human Interface and the Management of Information. Interacting in Information Environments, Symposium on Human Interface 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part II, pp. 289-298, 2007, Springer, 978-3-540-73353-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy practices, privacy perceptions, privacy risk, public education |
50 | Ponnurangam Kumaraguru, Lorrie Faith Cranor |
Privacy in India: Attitudes and Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers, pp. 243-258, 2005, Springer, 3-540-34745-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki |
Towards Modeling Wireless Location Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers, pp. 59-77, 2005, Springer, 3-540-34745-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Alfred Kobsa |
A Component Architecture for Dynamically Managing Privacy Constraints in Personalized Web-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers, pp. 177-188, 2003, Springer, 3-540-20610-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Geoff Skinner, Song Han 0004, Elizabeth Chang 0001 |
Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA, pp. 101, 2006, IEEE Computer Society, 0-7695-2571-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Hendrik J. G. Oberholzer, Martin S. Olivier |
Privacy Contracts as an Extension of Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 21st International Conference on Data Engineering Workshops, ICDE 2005, 5-8 April 2005, Tokyo, Japan, pp. 1192, 2005, IEEE Computer Society, 0-7695-2657-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | P. Jonathon Phillips |
Privacy Operating Characteristic for Privacy Protection in Surveillance Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio- and Video-Based Biometric Person Authentication, 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings, pp. 869-878, 2005, Springer, 3-540-27887-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Geoff Skinner, Song Han 0004, Elizabeth Chang 0001 |
A New Conceptual Framework Within Information Privacy: Meta Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 55-61, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | George Yee, Larry Korba |
Privacy Policy Compliance for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: Proceedings of the IEEE International Conference on Web Services (ICWS'04), June 6-9, 2004, San Diego, California, USA, pp. 158-165, 2004, IEEE Computer Society, 0-7695-2167-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Michael Backes 0001, Markus Dürmuth, Rainer Steinwandt |
An Algebra for Composing Enterprise Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 33-52, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor |
A user study of the expandable grid applied to P3P privacy policy visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 45-54, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
expandable grid, privacy, user interface, policy, p3p |
49 | Mingyan Li, Krishna Sampigethaya, Leping Huang, Radha Poovendran |
Swing & swap: user-centric approaches towards maximizing location privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 19-28, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
wireless network, tracking, location privacy, user-centric |
49 | Dhiah el Diehn I. Abou-Tair |
A framework ensuring privacy in a distributed environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 47, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, access control, information flow control, policy enforcement |
48 | Arik Friedman, Assaf Schuster |
Data mining with differential privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 493-502, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data mining, decision trees, differential privacy |
48 | Jessica Staddon |
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 11-14, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
linkedin, data mining, privacy, social network, policy |
48 | Frank McSherry, Ilya Mironov |
Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 627-636, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Netflix, recommender systems, differential privacy |
48 | Tiancheng Li, Ninghui Li |
On the tradeoff between privacy and utility in data publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 517-526, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
data mining, privacy, anonymity, data publishing |
48 | John W. Stamey, Ryan A. Rossi |
Automatically identifying relations in privacy policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 27th Annual International Conference on Design of Communication, SIGDOC 2009, Bloomington, Indiana, USA, October 5-7, 2009, pp. 233-238, 2009, ACM, 978-1-60558-559-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
latent relations, ambiguities, privacy policies |
48 | Bugra Gedik, Ling Liu 0001 |
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 7(1), pp. 1-18, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Location Privacy, k-anonymity, Mobile Computing Systems, Location-based Applications |
48 | Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, Adam D. Smith |
Composition attacks and auxiliary information in data privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August 24-27, 2008, pp. 265-273, 2008, ACM, 978-1-60558-193-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
adversarial attacks, privacy, anonymization |
48 | Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Satyen Kale, Frank McSherry, Kunal Talwar |
Privacy, accuracy, and consistency too: a holistic solution to contingency table release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Sixth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 11-13, 2007, Beijing, China, pp. 273-282, 2007, ACM, 978-1-59593-685-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, OLAP, contingency table |
48 | Michael Boyle, Saul Greenberg |
The language of privacy: Learning from video media space analysis and design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Hum. Interact. ![In: ACM Trans. Comput. Hum. Interact. 12(2), pp. 328-370, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
environmental psychology, solitude, video media spaces, privacy, Human-computer interaction, computer-supported cooperative work (CSCW), user interface design, social interaction, confidentiality, autonomy |
48 | Adam Barth, John C. Mitchell |
Enterprise privacy promises and enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WITS ![In: Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005, pp. 58-66, 2005, ACM, 1-58113-980-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
policy summary, modal logic, privacy policy, P3P, EPAL |
48 | Nayot Poolsappasit, Indrakshi Ray |
Towards a scalable model for location privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRINGL ![In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings, pp. 46-51, 2008, ACM. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, access control, location privacy |
48 | Daniel D. Walker, Eric G. Mercer, Kent E. Seamons |
Or Best Offer: A Privacy Policy Negotiation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 173-180, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privay policy negotiation protocol, privacy, protocol, game theory, negotiation, utility, pareto optimality, privacy policy, P3P, preference models |
48 | Robert W. Proctor, Kim-Phuong L. Vu, M. Athar Ali |
Usability of User Agents for Privacy-Preference Specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (9) ![In: Human Interface and the Management of Information. Interacting in Information Environments, Symposium on Human Interface 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part II, pp. 766-776, 2007, Springer, 978-3-540-73353-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
usability, privacy policies, privacy preferences |
48 | Huidong Jin 0001 |
Practical Issues on Privacy-Preserving Health Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD Workshops ![In: Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers, pp. 64-75, 2007, Springer, 978-3-540-77016-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data anonymisation, privacy inference, health data privacy, encryption, secure multiparty computation |
48 | Clare-Marie Karat, John Karat, Carolyn Brodie, Jinjuan Feng |
Evaluating interfaces for privacy policy rule authoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montréal, Québec, Canada, April 22-27, 2006, pp. 83-92, 2006, ACM, 1-59593-372-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, design process, privacy policies, natural language interfaces, social and legal issues |
48 | Dimitris Gritzalis, Nikolaos Kyrloglou |
Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCCC ![In: 21st International Conference of the Chilean Computer Science Society (SCCC 2001), 6-8 November 2001, Punta Arenas, Chile, pp. 115-123, 2001, IEEE Computer Society, 0-7695-1396-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Security, Privacy, e-Commerce, Anonymity, User profile, Privacy-enhancing technologies (PET), Personal data, Infomediary |
47 | Celal Öztürk, Yanyong Zhang, Wade Trappe |
Source-location privacy in energy-constrained sensor network routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004, pp. 88-93, 2004, ACM, 1-58113-972-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
context privacy, sensor networks privacy, source-location privacy, flooding |
46 | Alessandro Acquisti, Ralph Gross |
Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 36-58, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Nicholas Paul Sheppard, Reihaneh Safavi-Naini |
Protecting Privacy with the MPEG-21 IPMP Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 152-171, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Carl A. Gunter, Michael J. May, Stuart G. Stubblebine |
A Formal Privacy System and Its Application to Location Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers, pp. 256-282, 2004, Springer, 3-540-26203-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Josep Domingo-Ferrer, Qianhong Wu |
Safety and Privacy in Vehicular Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Location-Based Applications ![In: Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]., pp. 173-189, 2009, Springer, 978-3-642-03510-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Car-to-car messages, Privacy, Trust, Vehicular ad hoc networks |
46 | Alexandre V. Evfimievski, Johannes Gehrke, Ramakrishnan Srikant |
Limiting privacy breaches in privacy preserving data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 9-12, 2003, San Diego, CA, USA, pp. 211-222, 2003, ACM, 1-58113-670-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini |
Enforcing P3P Policies Using a Digital Rights Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, pp. 200-217, 2007, Springer, 978-3-540-75550-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Jan Paul Kolter, Günther Pernul |
Generating User-Understandable Privacy Preferences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 299-306, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Michael Hart, Claude Castille, Rob Johnson, Amanda Stent |
Usable Privacy Controls for Blogs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (4) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 401-408, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Qingsheng Zhang, Yong Qi, Jizhong Zhao, Di Hou, Tianhai Zhao, Liang Liu |
A Study on Context-aware Privacy Protection for Personal Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 1351-1358, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Akhilesh Tyagi |
Energy-Privacy Trade-Offs in VLSI Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings, pp. 361-374, 2005, Springer, 3-540-30805-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Tae Joong Kim, Sang Won Lee, Eung Young Lee |
Privacy Engineering in ubiComp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part III, pp. 1279-1288, 2005, Springer, 3-540-25862-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Eric S. K. Yu, Luiz Marcio Cysneiros |
Designing for Privacy in a Multi-agent World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trust, Reputation, and Security ![In: Trust, Reputation, and Security: Theories and Practice, AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002, Selected and Invited Papers, pp. 209-223, 2002, Springer, 3-540-00988-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 63336 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|