A Privacy Taxonomy for the Management of Ubiquitous Environments
A Privacy Taxonomy for the Management of Ubiquitous Environments
出处
《通讯和计算机(中英文版)》
2013年第12期1529-1553,共25页
Journal of Communication and Computer
参考文献45
-
1M. Weiser, The Computer for the Twenty-First Century, Scientific American (1991) 94-10.
-
2M. Satyanarayanan, Pervasive computing: Vision and challenges, IEEE Personal Communications 8 (2001) 10-17.
-
3D. Saha, A. Mukherjee, Pervasive computing: A paradigm for the 21st century, Computer 36 (2003) 25-31.
-
4RFID Journal, http://www.rfidjoumal.com (accessed April 2012).
-
5Wireless Sensor Network [Online], Scientific Research, http://www.scirp.org/journal/wsn (accessed May 2012).
-
6S. Warren, L. Brandeis, The right to privacy, Harward Law Review 4 (1890) 193-220.
-
7V.R.Q. Leithardt, D. Nunes, A.G.M Rossetto, C.O. Rolim C.F.R. Geyer, J.S. Silva, Privacy Management Solution in Ubisuitous Environments Using Percontrol, Journal of Ubiquitous Systems and Pervasive Networks (JUSPN) 5 (2014)21-28.
-
8J. Ye, L, Coyle, S. Dobson, P. Nixon, Ontology-based models in pervasive computing systems, Knowl. Eng. Rev. 22 (2007) 315-347.
-
9E. Moschetta, R.S. Antunes, M.P. Barcellos, More flexible degrees of collaboration, security and privacy in service discovery in ubiquitous environments, in: XXVI Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2008), Rio de Janeiro, Brazil, May 26-30, 2008.
-
10M. Ros, M. D'Souza, A. Postula, 1. MacColl, Wireless outdoor personal area network using adaptive inquiry scanning tbr location-based services, Personal and Ubiquitous Computing 17 (2013) 387-397.
-
1A Work Service Model of the Ubiquitous Environment Collaboration[J].Journal of Civil Engineering and Architecture,2012,6(1):44-52.
-
2刘峰.在线社交网络中好友亲密度判定方法研究[J].软件导刊,2013,12(8):113-116.
-
3NIST提出新的联邦政府信息系统和组织隐私控制提案[J].信息技术与标准化,2011(8):65-65.
-
4徐一波.藏牢你的Windows 8.1隐私[J].电脑爱好者,2014,0(11):37-37.
-
5埃里卡.诺恩.Buzz悄然改变[J].科技创业,2010(4):106-107.
-
6刘炽.网络安全特警2001保护个人用户[J].科技新时代,2001(1):24-24.
-
7WEI Wei QI Yong HOU Di.Exploration of Energy Conservation MAC Protocol of WSNs for Ubiquitous Environment[J].Wuhan University Journal of Natural Sciences,2008,13(4):509-512.
-
8廖明华.安卓应用程序误用用户信息的监测与控制[J].计算机系统应用,2014,23(6):215-219.
-
9唐娜.保障计算机安全十三招[J].计算机与网络,2004,30(6):18-18.
-
10沈洪洲,宗乾进,袁勤俭,朱庆华.我国社交网络隐私控制功能的可用性研究[J].计算机应用,2012,32(3):690-693. 被引量:12