Web Privacy with P3p
Privacy in information technology: designing to enable privacy policy management in organizations
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Privacy protection in personalized search
ACM SIGIR Forum
Promoting personal responsibility for internet safety
Communications of the ACM - Urban sensing: out of the woods
Australian banks' approaches to privacy in an online world
International Journal of Electronic Finance
A privacy expectations and security assurance offer system
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
CNL4DSA: a controlled natural language for data sharing agreements
Proceedings of the 2010 ACM Symposium on Applied Computing
Fighting identity theft: The coping perspective
Decision Support Systems
Personal information management (PIM) for intelligence analysis
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Trap hunting: finding personal data management issues in next generation AAC devices
SLPAT '11 Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies
Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management
The effects of location access behavior on re-identification risk in a distributed environment
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Increasing service users' privacy awareness by introducing on-line interactive privacy features
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Security of the automatic information on-line: a study of the controls forbid
ADNTIIC'11 Proceedings of the Second international conference on Advances in New Technologies, Interactive Interfaces and Communicability
Trustworthy and inclusive identity management for applications in social media
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: users and contexts of use - Volume Part III
Hi-index | 0.00 |
The goal is a policy workbench enabling users to create and transform natural language policies into machine-readable code for enforcement and compliance audits.