References
- “P3P1.0: The Platform for Privacy Preferences 1.0 Specification,” W3C, http://www.w3.org/TG/P3P/, 2002.
- P. Ashley, S. Hada, G. Karjth, M. Schunter, E-P3P, “Privacy Policies and Privacy Authorization,” ACM Workshop on Privacy in The Electronic Society (WPES), pp.103-109, 2002. https://doi.org/10.1145/644527.644538
- “Identity Management Systems (IMS): Identification and Comparison Study,” Commissioned by the Joint Research Centre, Seville, Spain, September 2003. http://www.datenschutzzentrum.de/idmanage/study/ICPP_SNG_IMS-Study.pdf.
- Kurkovsky, O Rivera, J Bhalodi, “Classification of Privacy Management Techniques in Pervasive Computing,” International Journal of u- and e-Service, Science and Technology, Vol.11, No.1, pp.55-71, 2007
- Michiru Tanaka, Jun Sasaki, Yutaka Funyu, and Yoshimi Teshigawara, “A Personal Information Protection Model for Web Applications by Utilizing Mobile Phones,” Frontiers in Artificial Intelligence and Applications; Proceedings of the 2008 conference on Information Modelling and Knowledge Bases XIX, Vol.166, pp.346-353, 2008.
- Md. Nurul Huda and Eiji Kamioka, “Privacy Protection in Mobile Agent based Service Domain,” Proceedings of the Third International Conference on Information Technology and Applications (ICITA’05), Vol.2, pp.482-487, 2005. https://doi.org/10.1109/ICITA.2005.218
- M. Langheinrich, “A Privacy Awareness System for Ubiquitous Computing Environments,” Proceedings of International Conference on Ubiquitous Computing 2002 (UbiComp 2002), pp.237-245, 2002.
- Xiaodong Jiang, Jason I. Hong, James A. Landay “Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing”, Proceedings of the 4th international conference on Ubiquitous Computing, Sep., pp.176-193, 2002. https://doi.org/10.1007/3-540-45809-3_14
- “Introduction to the Liberty Alliance Identity Architecture,” Liberty Alliance Project, http://www.Projectliberty.org/, March, 2003.
- Scott Cantor, John Kemp, “Liberty ID-FF Protocols and Schema Specification,” Version 1.2 Liberty Alliance Project, January, 2004.
- “SourceID: Federated identity infrastructure,” Ping Identity, 2004, http://www.sourceid.org/.
- “Microsoft .NET Passpost, “Microsoft, 2004, http://www.microsoft.com/net/services/passport/.
- S.R. Cho and S.H. Jin, “A Digital Identity Interchange Framework for User-Centric ID Management,” http://eettrends.etri.re.kr, Vol.23, No.6, pp.102-111, December, 2008.
- Xiang Yang, Yuanyi Zhang, Qinzhou Niu, Xiaomei Tao, Luo Wu, “A Mobile-Agent-Based Application Model Design of Pervasive Mobile Devices,” Proceedings of Pervasive Computing and Applications, pp.1-6, 2007. https://doi.org/10.1109/ICPCA.2007.4365402
Cited by
- Preserving Differential Privacy for Similarity Measurement in Smart Environments vol.2014, 2014, https://doi.org/10.1155/2014/581426