1 |
Xiang Yang, Yuanyi Zhang, Qinzhou Niu, Xiaomei Tao, Luo Wu, “A Mobile-Agent-Based Application Model Design of Pervasive Mobile Devices,” Proceedings of Pervasive Computing and Applications, pp.1-6, 2007.
DOI
|
2 |
Michiru Tanaka, Jun Sasaki, Yutaka Funyu, and Yoshimi Teshigawara, “A Personal Information Protection Model for Web Applications by Utilizing Mobile Phones,” Frontiers in Artificial Intelligence and Applications; Proceedings of the 2008 conference on Information Modelling and Knowledge Bases XIX, Vol.166, pp.346-353, 2008.
|
3 |
Md. Nurul Huda and Eiji Kamioka, “Privacy Protection in Mobile Agent based Service Domain,” Proceedings of the Third International Conference on Information Technology and Applications (ICITA’05), Vol.2, pp.482-487, 2005.
DOI
|
4 |
M. Langheinrich, “A Privacy Awareness System for Ubiquitous Computing Environments,” Proceedings of International Conference on Ubiquitous Computing 2002 (UbiComp 2002), pp.237-245, 2002.
|
5 |
Xiaodong Jiang, Jason I. Hong, James A. Landay “Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing”, Proceedings of the 4th international conference on Ubiquitous Computing, Sep., pp.176-193, 2002.
DOI
ScienceOn
|
6 |
“Introduction to the Liberty Alliance Identity Architecture,” Liberty Alliance Project, http://www.Projectliberty.org/, March, 2003.
|
7 |
Scott Cantor, John Kemp, “Liberty ID-FF Protocols and Schema Specification,” Version 1.2 Liberty Alliance Project, January, 2004.
|
8 |
“SourceID: Federated identity infrastructure,” Ping Identity, 2004, http://www.sourceid.org/.
|
9 |
“Microsoft .NET Passpost, “Microsoft, 2004, http://www.microsoft.com/net/services/passport/.
|
10 |
S.R. Cho and S.H. Jin, “A Digital Identity Interchange Framework for User-Centric ID Management,” http://eettrends.etri.re.kr, Vol.23, No.6, pp.102-111, December, 2008.
|
11 |
“P3P1.0: The Platform for Privacy Preferences 1.0 Specification,” W3C, http://www.w3.org/TG/P3P/, 2002.
|
12 |
P. Ashley, S. Hada, G. Karjth, M. Schunter, E-P3P, “Privacy Policies and Privacy Authorization,” ACM Workshop on Privacy in The Electronic Society (WPES), pp.103-109, 2002.
DOI
|
13 |
Kurkovsky, O Rivera, J Bhalodi, “Classification of Privacy Management Techniques in Pervasive Computing,” International Journal of u- and e-Service, Science and Technology, Vol.11, No.1, pp.55-71, 2007
|
14 |
“Identity Management Systems (IMS): Identification and Comparison Study,” Commissioned by the Joint Research Centre, Seville, Spain, September 2003. http://www.datenschutzzentrum.de/idmanage/study/ICPP_SNG_IMS-Study.pdf.
|