Dynamic negotiation in the privacy wars
Technology Review
Consumer privacy concerns about Internet marketing
Communications of the ACM
Individual management of personal reachability in mobile communication
SEC'97 Proceedings of the IFIP TC11 13 international conference on Information Security (SEC '97) on Information security in research and business
On secure and pseudonymous client-relationships with multiple servers
ACM Transactions on Information and System Security (TISSEC)
Developing for privacy: civility frameworks and technical design
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Principles for privacy protection software
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Indirect threats to freedom and privacy: governance of the Internet and the WWW
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
Privacy-preserving global customization
Proceedings of the 2nd ACM conference on Electronic commerce
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Personalized hypermedia and international privacy
Communications of the ACM - The Adaptive Web
A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web
User Modeling and User-Adapted Interaction
User Modeling for Personalized City Tours
Artificial Intelligence Review
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
ACM Transactions on Internet Technology (TOIT)
A Reference Model for Designing an E-Commerce Curriculum
IEEE Concurrency
Privacy critics: UI components to safeguard users' privacy
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
EDBT '00 Proceedings of the 7th International Conference on Extending Database Technology: Advances in Database Technology
Tailoring Privacy to Users' Needs
UM '01 Proceedings of the 8th International Conference on User Modeling 2001
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Database privacy: balancing confidentiality, integrity and availability
ACM SIGKDD Explorations Newsletter
Web usage mining: discovery and applications of usage patterns from Web data
ACM SIGKDD Explorations Newsletter
privacy perspective from utilitarianism and metaphysical theories
Current security management & Ethical issues of information technology
Using organisational safeguards to make justifiable privacy decisions when processing personal data
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Towards Pseudonymous e-Commerce
Electronic Commerce Research
Personalised hypermedia presentation techniques for improving online customer relationships
The Knowledge Engineering Review
Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
Enterprise privacy promises and enforcement
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Improving understanding of website privacy policies with fine-grained policy anchors
WWW '05 Proceedings of the 14th international conference on World Wide Web
Voter-centered design: Toward a voter decision support system
ACM Transactions on Computer-Human Interaction (TOCHI)
Some methods to depress the risks of the online transactions
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Bridging the gap between organizational and user perspectives of security in the clinical domain
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Can pseudonymity really guarantee privacy?
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Privacy and e-commerce: a consumer-centric perspective
Electronic Commerce Research
The intellectual challenge of CSCW: the gap between social requirements and technical feasibility
Human-Computer Interaction
Short Survey: Privacy-enhancing technologies for the world wide web
Computer Communications
Privacy-enhancing technologies for the internet, II: five years later
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
An analysis of private browsing modes in modern browsers
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Collaborative Planning with Confidentiality
Journal of Automated Reasoning
Data usage control in the future internet cloud
The future internet
Using XACML for privacy control in SAML-based identity federations
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Policy-based integration of user and provider-sided identity management
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Declarative privacy policy: finite models and attribute-based encryption
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Extending p3p to facilitate proxies which pose as a potential threat to privacy
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
An architecture for privacy-aware inter-domain identity management
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers
Decision Support Systems
Identity management through "profiles": prototyping an online information segregation service
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: users and contexts of use - Volume Part III
Web Intelligence and Agent Systems
Hi-index | 48.22 |