References
- Asia Pacific Economic Cooperation (APEC), "APEC Privacy Framework," 2005.
- http://www.oecd.org/document/18/0,3746,en_2649_4255_18151861_1_1_1,00&&en-USS_01DBC.html, "OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data", 1980.
- http://www.law.cornell.edu/rules/frcp/index.html #chapter_v, "Federal Rule of Civil Procedure."
- ISO/IEC JTCI SC27 Privacy Framework, SC27 N9226, May. 2011.
- ISO/IEC JTCI SC27 Privacy Refcrence Architecture, SC27 N9228, May. 2011.
- ISO/lEC JTCI SC27 WG5 StrudyPeriod Vocabulary, SC27 N9401, May. 2011.
- ISO/IEC JTCI SC27 WG5 Recommendation, SC27 N9237, May. 2011.
- ISO/IEC JTCI SC27 Buisiness Plan for JTCI SC27 "Security Technique," SC27 N9463, Jun. 2010.
- ISO/IEC JTCI SC27 WG5 Resolution, SC27 N9920, May. 2011.
- ITU-T SGI7 Q.9 Summaries for work item under development in Question 9, TD1350, Dec. 2010.
- ITU-T SG17 Q.9 Meeting Report on Q.9/17, TD1425, Dec. 2010.
- HomelandSequrity Whitepaoer, "Computer Network Security & Privacy Protection," 2011
- http://www.cs.ucdavis.edu/-hchcn/paper/passat09.pdf: "Noise Injcction for Search Privacy Protection," 2011.
- 전명근, "바이오 보안 토큰을 위한 표준안 개발," 정보통신표준기술력향상사업 최종보고서, 지식경제부, 방송통신위원회, 2011.