1 |
ISO/lEC JTCI SC27 WG5 StrudyPeriod Vocabulary, SC27 N9401, May. 2011.
|
2 |
ISO/IEC JTCI SC27 WG5 Recommendation, SC27 N9237, May. 2011.
|
3 |
ISO/IEC JTCI SC27 Buisiness Plan for JTCI SC27 "Security Technique," SC27 N9463, Jun. 2010.
|
4 |
ISO/IEC JTCI SC27 WG5 Resolution, SC27 N9920, May. 2011.
|
5 |
http://www.oecd.org/document/18/0,3746,en_2649_4255_18151861_1_1_1,00&&en-USS_01DBC.html, "OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data", 1980.
|
6 |
http://www.law.cornell.edu/rules/frcp/index.html #chapter_v, "Federal Rule of Civil Procedure."
|
7 |
ISO/IEC JTCI SC27 Privacy Framework, SC27 N9226, May. 2011.
|
8 |
ISO/IEC JTCI SC27 Privacy Refcrence Architecture, SC27 N9228, May. 2011.
|
9 |
ITU-T SG17 Q.9 Meeting Report on Q.9/17, TD1425, Dec. 2010.
|
10 |
ITU-T SGI7 Q.9 Summaries for work item under development in Question 9, TD1350, Dec. 2010.
|
11 |
HomelandSequrity Whitepaoer, "Computer Network Security & Privacy Protection," 2011
|
12 |
http://www.cs.ucdavis.edu/-hchcn/paper/passat09.pdf: "Noise Injcction for Search Privacy Protection," 2011.
|
13 |
전명근, "바이오 보안 토큰을 위한 표준안 개발," 정보통신표준기술력향상사업 최종보고서, 지식경제부, 방송통신위원회, 2011.
|
14 |
Asia Pacific Economic Cooperation (APEC), "APEC Privacy Framework," 2005.
|