1 |
Asia Pacific Economic Cooperation (APEC), "APEC Privacy Framework", 2005.
|
2 |
http://www.oecd.org/document/18/0,3746,en_2649_34255_1815186_1_1_1_1,00&&en-USS_01 DBC.html, "OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data", 1980.
|
3 |
http://www.law,cornell.edu/rules/frcp/index.html#chapter_v, "Federal Rule of Civil Procedure".
|
4 |
ISO/IEC JTC1 SC27 Privacy Framework, SC27 N9226, May. 2011.
|
5 |
ISO/IEC JTC1 SC27 Privacy Reference Architecture, SC27 N9228, May. 2011.
|
6 |
ISO/IEC JTC1 SC27 WG5 StrudyPeriod Vocabulary, SC27 N9401, May. 2011.
|
7 |
ISO/IEC JTC1 SC27 WG5 Recommendation, SC27 N9237, May. 2011.
|
8 |
ISO/IEC JTC1 SC27 Buisiness Plan for JTC1 SC27 "Security Technique", SC27 N9463, Jun. 2010.
|
9 |
ISO/IEC JTC1 SC27 WG5 Resolution, SC27 N9920, May. 2011.
|
10 |
ITU-T SG17 Q.9 Summaries for work item under development in Question 9, TD1350, Dec. 2010.
|
11 |
ITU-T SG17 Q.9 Meeting Report on Q.9/17, TD1425, Dec. 2010.
|
12 |
HomelandSequrity Whitepaoer, "Computer Network Security & Privacy Protection", 2011.
|
13 |
http://www.cs.ucdavis.edu/-hchen/paper/passat09.pdf, "Nois Injection for Search Privacy Protection", 2011.
|