共 83 条
[1]
Ackerman M.S., Cranor L.F., Reagle J., Privacy in e-commerce: Examining user scenarios and privacy preferences, Proceedings of the 1st ACM Conference on Electronic Commerce, pp. 1-8, (1999)
[2]
Adam N.R., Worthmann J.C., Security-control methods for statistical databases: A comparative study, ACM Computing Surveys, 21, 4, pp. 515-556, (1989)
[3]
Agrawal D., Aggarwal C.C., On the design and quantification of privacy preserving data mining algorithms, Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 247-255, (2001)
[4]
Agrawal R., Srikant R., Privacy-preserving data mining, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 439-450, (2000)
[5]
Arendt H., The Human Condition, (1958)
[6]
Ashley P., Hada S., Karjoth G., Schunter M., E-p3p privacy policies and privacy authorization, Proceeding of the ACM Workshop on Privacy in the Electronic Society, pp. 103-109, (2002)
[7]
Ashley P., Powers C., Schunter M., From privacy promises to privacy management: A new approach for enforcing privacy throughout an enterprise, Proceedings of the 2002 Workshop on New Security Paradigms, pp. 43-50, (2002)
[8]
Beck L.L., A security mechanism for statistical databases, ACM Transactions on Database Systems, 5, 3, pp. 316-338, (1980)
[9]
Benn S.I., Gaus G.F., Public and Private in Social Life, (1983)
[10]
Bloustein E.J., Privacy as an aspect of human dignity, New York University Law Review, 39, pp. 962-1007, (1964)