Nội dung được dịch bởi AI, chỉ mang tính chất tham khảo
Nhúng quyền riêng tư trong quy trình phát triển ứng dụng CNTT
Tóm tắt
Từ khóa
Tài liệu tham khảo
Bleichenbacher, D., Gabber, E., Gibbons, P., Matias, Y. and Mayer, A. (1998), “On secure and pseudonymous client‐relationships with multiple servers”, Proceedings of the 3rd USENIX Workshop on Electronic Commerce, USA.
Borking, J., van Eck, B. and Siepel, P. (1999), Intelligent Software Agents: Turning a Privacy Threat into a Privacy Protector, Information and Privacy Commission, April.
Cartrysse, K., Lubbe, J. and Kabasele, J. (2001), “Building a privacy guardian for the electronic age”, IST/PISA project, Deliverable D10, available at: http://pet‐pisa.openspace.nl/pisa_ org/pisa/pisa_project_deliverables.html.
Chaum, D. (1981), “Untraceable electronic mail, return addresses and digital pseudonyms”, Communications of the ACM, Vol. 24 No. 2.
Chaum, D. (1990), “Showing credentials without identification transferring signatures between unconditionally un‐linkable pseudonyms”, Advances in Cryptology (USCRYPT '90), January.
Clarke, R. (2001), “The legal context of privacy‐enhancing and privacy‐sympathetic technologies”, The Australian National University, available at: www.anu.edu.au/people/Roger.Clarke/DV/Florham.html.
Clifford, M., Lavine, C. and Bishop, M. (1998), “The solar trust model: authentication without limitation”, Proceedings of the Annual Computer Security Applications Conference, USA.
Cranor, L. (1999), “Internet privacy”, Communications of the ACM, Vol. 42 No. 2, pp. 29‐66.
Data Protection Commission of The Netherlands (1995), Privacy‐Enhancing Technologies: The Path to Anonymity, Vol. 2, August, Data Protection Commission of The Netherlands.
Froomkin, M. (1996), “Flood control on the information ocean: living with anonymity, digital cash and distributed databases”, Pittsburgh Journal of Law and Commerce, p. 395.
Goldberg, I. and Wagner, D. (1998), “TAZ servers and the rewebber network: enabling anonymous publishing on the WWW”, First Monday Peer Reviewed Journal on The Internet, Vol. 3 No. 4.
Goldberg, I., Wagner, D. and Brewer, E. (1997), “Privacy‐enhancing technologies for the Internet”, Proceedings of IEEE COMPCON ’97 Conference, February, available at: www.cs.berkeley.edu/∼daw/papers/privacy‐compcon97‐www/privacy‐html.
Goodman, P. (1996), “Secure deletion of data from magnetic and solid‐state memory”, Proceedings of the USENIX Security Symposium, USA, available at: www.usenix.org/ publications/library/proceedings/sec96/full_papers/gutmann/.
Gritzalis, D., Moulinos, K. and Kostis, K. (2001), “A privacy‐enhancing e‐business model based on infomediaries”, Proceedings of the Workshop on Mathematical Methods, Models, and Architectures for Computer Networks Security, Russia.
Gritzalis, S., Katsikas, S., Lekkas, D., Moulinos, K. and Polydorou, E. (2000), “Securing the electronic market: the KEYSTONE Public Key Infrastructure architecture”, Computers & Security, Vol. 19 No. 8, pp. 731‐46.
Information and Privacy Commission (1995), Privacy‐Enhancing Technologies: The Path to Anonymity, Vol. 1, August, Information and Privacy Commission, Ontario, available at: www.ipc.on.ca/english/pubpres/papers/anon‐e.htm.
Lee, G. (1996), “Addressing anonymous messages in cyberspace”, Journal of Computer‐ Mediated Communication, Vol. 2, June, available at: www. ascusc.org/jcmc/vol2/ issue1/anon.html.
McCullagh, A. (1998), “The establishment of trust in the electronic commerce environment”, Proceedings of the Information Industry Outlook Conference, Australia, available at: www.acs.org.au/president/1998/past/io98/etrust.
Nolan, J. (2000), “Employee privacy in the electronic workplace, part 1: surveillance, records and emails”, Privacy Law and Policy Reporter, December, available at: www.austlii.edu.au/au/journals/PLPR/2000/ 51.html.
OECD (1999), Inventory of Instruments and Mechanisms Contributing to the Implementation and Enforcement of the OECD Privacy Guidelines on Global Networks, DSTI/ ICCP/REG(98)12/Final, OECD, Paris.
Pfitzmann, A. and Köhntopp, M. (2001), “Anonymity, unobservability and pseudonymity: a proposal for terminology”, Proceedings of the 4th International Information Hiding Workshop, USA, available at: www.cert.org/IHW2001/terminology_proposal.pdf.
(The) Platform for Privacy Preferences 1.0 Specification (2000), W3C Candidate Recommendation 15, December.
Reiter, M. and Rubin, A. (1998), “Crowds: anonymity for Web transactions”, ACM Transactions on Information and System Security, Vol. 1, November, available at: www.research.att.com/projects/crowds.
Rennhard, M., Rafaeli, S., Mathy, L., Plattner, B. and Hutchison, D. (1997), “An architecture for an anonymity network”, The Mc Kinsey Quarterly, No. 4, November.
Rowland, D. (2000), “Anonymity, privacy and cyberspace”, Proceedings of the 15th BILETA Conference, available at: www.bileta.ac.uk/00papers/rowland.html.
Scollay, M. (1997), “Information privacy in Australia”, Privacy Law & Policy Reporter, July, available at: www.austlii.edu.au/au/journals/ PLPR/1997/36.html.
Spiekermann, S., Grossglags, J. and Berendt, B. (2001), “Stated privacy preferences vs actual behaviour in EC environments: a reality check”, Proceedings of the 5th International Conference on Applied Informatics, available at www.wiwi.hu‐berlin.de/∼sspiek/artikel/final_privacy.pdf.
Tuker, G. (1999), “Privacy recommendations for financial services: contrasting the Australian and Canadian approaches”, Privacy Law & Policy Reporter, January, available at: www.austlii.edu.au/au/journals/PLPR/1999/5.html.
