共 35 条
- [2] Anderson Anne., 2005, COMP 2 PRIVACY POLIC
- [3] [Anonymous], 2006, ACM T KNOWL DISCOV D
- [4] [Anonymous], 1890, Harvard Law Review, DOI DOI 10.2307/1321160
- [5] Analyzing website privacy requirements using a privacy goal taxonomy [J]. IEEE JOINT INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2002, : 23 - 31
- [6] Barth A., 2005, Proceedings of the 2005 workshop on Issues in the theory of security, P58
- [7] Privacy and utility in business processes [J]. 20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 279 - +
- [8] Becker A., 2008, P 8 ACM WORKSH DIG R, P77
- [9] Mix zones: User privacy in location-aware services [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 127 - 131