ACM Transactions on Internet Technology (TOIT)
Use of a P3P user agent by early adopters
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
An XPath-based preference language for P3P
WWW '03 Proceedings of the 12th international conference on World Wide Web
Automated analysis of P3P-enabled Web sites
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
'I didn't buy it for myself' privacy and ecommerce personalization
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
'I didn't buy it for myself': privacy and Ecommerce personalization
Designing personalized user experiences in eCommerce
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
Enterprise privacy promises and enforcement
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Managing Multiple and Dependable Identities
IEEE Internet Computing
Improving understanding of website privacy policies with fine-grained policy anchors
WWW '05 Proceedings of the 14th international conference on World Wide Web
Usable security and privacy: a case study of developing privacy management tools
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Privacy in information technology: designing to enable privacy policy management in organizations
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Bridging the gap between organizational and user perspectives of security in the clinical domain
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Usable privacy and security for personal information management
Communications of the ACM - Personal information management
SWS '04 Proceedings of the 2004 workshop on Secure web service
Evaluating interfaces for privacy policy rule authoring
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
Internet content filtering using isotonic separation on content category ratings
ACM Transactions on Internet Technology (TOIT)
Tracking website data-collection and privacy practices with the iWatch web crawler
Proceedings of the 3rd symposium on Usable privacy and security
Kalpana - enabling client-side web personalization
Proceedings of the nineteenth ACM conference on Hypertext and hypermedia
A privacy-aware access control system
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
Electronic Commerce Research and Applications
Privacy patterns for online interactions
Proceedings of the 2006 conference on Pattern languages of programs
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
A user study of the expandable grid applied to P3P privacy policy visualization
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Journal of Management Information Systems
Privacy with Web Serivces: Intelligence Gathering and Enforcement
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Timing is everything?: the effects of timing and placement of online privacy indicators
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Towards Achieving Personalized Privacy for Location-Based Services
Transactions on Data Privacy
Taking account of privacy when designing cloud computing services
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
Masking Gateway for Enterprises
Languages: From Formal to Natural
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
Sensitive Data Transaction in Hippocratic Multi-Agent Systems
Engineering Societies in the Agents World IX
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
The effects of introspection on creating privacy policy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
FM '09 Proceedings of the 2nd World Congress on Formal Methods
Data Protection-Aware Design for Cloud Services
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Accountability as a Way Forward for Privacy Protection in the Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Exploring the feasibility of web form adaptation to users' cultural dimension scores
User Modeling and User-Adapted Interaction
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Standardizing privacy notices: an online study of the nutrition label approach
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Conceptual modeling of privacy-aware web service protocols
CAiSE'07 Proceedings of the 19th international conference on Advanced information systems engineering
Usability challenges in security and privacy policy-authoring interfaces
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Dynamic masking of application displays using OCR technologies
IBM Journal of Research and Development
Experiences in the logical specification of the HIPAA and GLBA privacy laws
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Privacy policies with modal logic: the dynamic turn
DEON'10 Proceedings of the 10th international conference on Deontic logic in computer science
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study
Information Systems Research
Enhancing user privacy through data handling policies
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
A privacy protection model in ID management using access control
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Designing natural language and structured entry methods for privacy policy authoring
INTERACT'05 Proceedings of the 2005 IFIP TC13 international conference on Human-Computer Interaction
Design and implementation of a policy-based privacy authorization system
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Matelas: a predicate calculus common formal definition for social networking
ABZ'10 Proceedings of the Second international conference on Abstract State Machines, Alloy, B and Z
Searching for privacy: design and implementation of a p3p-enabled search engine
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management
Privacy management for global organizations
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Privacy in india: attitudes and awareness
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A dynamic logic for privacy compliance
Artificial Intelligence and Law - Special issue on Deontic Logic and Normative Systems
Enhancing privacy in cloud computing via policy-based obfuscation
The Journal of Supercomputing
Privacy assurance: bridging the gap between preference and practice
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers
Decision Support Systems
Middleware for location privacy: an overview
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Understanding privacy policies
Empirical Software Engineering
End-to-end policy based encryption techniques for multi-party data management
Computer Standards & Interfaces
Hi-index | 0.00 |