References
- 남기효, 박상중, 강형석, 남기환, 김성인, "개인정보보호 기술의 최신 동향과 향후 전망", 정보보호학회논문지, 제18권, 제6호, pp. 11-19, 2009.
- 윤상오, "전자정부 구현을 위한 개인 정보보호 정책에 관한 연구 : 정부신뢰 구축의 관점에서", 한국지역정보화학회지, 제12권, 제2호, pp. 1-29, 2009.
- 이재광, 장종수, 박기식, "사이버 공간에서의 개인정보보호", 한국정보사회학회, 정보와 사회, 제12권, pp. 51-65, 2007.
- 이해규, "인터넷 환경에서의 사용자 중심 ID 정보관리 모델에 관한 연구", 정보보호학회논문지, 제19권, 제3호, pp. 37-50, 2009.
- 장인주, "User-centric Personal Information Management Model for Privacy Protection," 인하대학교, Thesis, 2010.
- Ahn, G. J., "User-centric Privacy Management for Federated Identity Management," Collaborate Com '07, pp. 187-195, 2007.
- Bhargav-Spantzel, Squicciarini, A. C., and Bertino, E., "Integrating Federated Digital Identity Management and trust Negotiation-issues and solutions," Security and Privacy Magazine, IEEE, Vol. 5, No. 2, pp. 55-64, 2007. https://doi.org/10.1109/MSP.2007.46
- Bonatti, P., "Driving and Monitoring Provisional Trust Negotiation with Metapolicies," IEEE POLICY '05, pp. 14-23, 2005.
- Burmeister, P., "Treating Incomplete Knowledge in Formal Concept Analysis," LNAI 3626, pp. 114-126, 2005.
- Canard, S., "Identity Federation and Privacy : One Step Beyond," DIM '08, pp. 25-37, 2008.
- Deng, M., Cock, D. D., and Preneel, B., "toward a cross-context identity management framework in e-health," Online Information Review, Vol. 33, No. 3, pp. 422-442, 2009. https://doi.org/10.1108/14684520910969880
- Garcon, K., "Security and Privacy System Architecture for an e-Hospital Environment," in Idtrust '08 IBE, PBE, automated encryption processing, 2008.
- Josang, A., AlZomai, M., and Suriadi, S. "Usability and Privacy in Identity Management Architectures," AISW '07, pp. 143-152, 2007.
- Josang, A., Fabre, J., Hay, B., Dalziel, J., and Pope, S., "Trust Requirements in Identity Management," Proceeding of the AISW '05, pp. 99-108, 2005.
- Park, H.-A., "Privacy-Aware Access Control through Negotiation in Daily Life Service," LNCS 5075, pp. 514-519, 2008.
- Preibusch, S., "Ubiquitous social networks-opportunities and challenges for privacy-aware user modelling," DM. UM '07, pp. 698-721, 2007.
- Protege 3.1. [cited; Available from : http://protege.stanford.edu/doc/users.html.
- Qian Wang, Wiangling Shi, "Privacy Protection Based on l-Diversity," WCSE '09, pp. 367-372, 2009.
- Satchell, C., Shanks, G., Howard, S., and Murphy, J., "Identity crisis : user perspectives on multiplicity and control in federated identity management," Behaviour and Information Technology '09, pp. 1-12, 2009.
- Spantzel, A. B., Squiiciiarini, A. C., and Bertino, E., "Trust Negotiations in Identity Management," IEEE S&P 2007, pp. 55-63, 2007.
- Squicciarini, A. C., Elisa Bertino, E. Ferrari, and I. Ray, "Achieving Privacy in Trust Negotiations with an Ontology-Based Approach," IEEE Transactions on Dependable and Secure Computing, Vol. 3, pp. 13-31, 2004.
- Squicciarini, A. C. and Barghav, A., "Trust Negotiations with Customizable Anonymity," Proceed of the IEEE/WIC/ACM, pp. 69-72, 2006.
- Sweeney, L., "k-Anonymity : A Model for protecting Privacy Fuzziness and Knowledge-based Systems," Vol. 10, No. 5, pp. 557-570, 2002. https://doi.org/10.1142/S0218488502001648
- Wille, R., "Formal Concept Analysis as Mathematical Theory of Concepts and Concept Hierarchies," LNAI 3626, pp. 1-33, 2005.
Cited by
- 개인정보의 법적·기술적 특성을 고려한 라이프 사이클(Life Cycle) 모델 vol.17, pp.3, 2012, https://doi.org/10.7838/jsebs.2012.17.3.043