共 18 条
[1]
ADAMS A, 1999, P TEL POL RES C WASH
[2]
[Anonymous], 2009, ONLINE HARASSMENT CY
[3]
[Anonymous], 2002, P 9 ACM C COMPUTER C
[4]
[Anonymous], 1997, Proceedings of the Second ACM Workshop on Role-based Access Control. ACM, New York, NY, USA
[5]
Ardagna C.A., 2009, J COMPUTER IN PRESS
[6]
CHAUM D, 1985, COMMUN ACM, V28, P1030, DOI 10.1145/4372.4373
[7]
Cutler R., 1995, Interpersonal Computing and Technology: An electronic Journal for the 21st Century, V3, P12
[8]
Access control in a privacy-aware eLearning environment
[J].
FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS,
2006,
:879-+
[9]
PRIME - A European Project for Privacy-Enhancing Identity Management
[J].
IT-INFORMATION TECHNOLOGY,
2005, 47 (06)
:352-359
[10]
Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet
[J].
2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS,
2008,
:1364-+