Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Model driven security for process-oriented systems
Proceedings of the eighth ACM symposium on Access control models and technologies
Case Study on Retail Customer Communication Applying Ubiquitous Computing
CEC '04 Proceedings of the IEEE International Conference on E-Commerce Technology
Legal Programming: Designing Legally Compliant Rfid and Software Agent Architectures for Retail Processes and Beyond (Integrated Series in Information Systems)
Using Privacy Policies to Protect Privacy in UBICOMP
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Personalization in privacy-aware highly dynamic systems
Communications of the ACM - Privacy and security in highly dynamic systems
A three-layered model to implement data privacy policies
Computer Standards & Interfaces
Does enforcing anonymity mean decreasing data usefulness?
Proceedings of the 4th ACM workshop on Quality of protection
Requirements and compliance in legal systems: a logic approach
RELAW '08 Proceedings of the 2008 Requirements Engineering and Law
Hi-index | 0.00 |
Using a process modeling-based approach to address privacy and related legal issues arising in an RFID-based augmented reality shopping situation.