参考文献
|
-
Draft opinion of the working party on the protection of individuals with regard to the processing of personal data
-
Removing data transfer from P3P
-
Safe Harbor Privacy Principles
-
D. Chaum,Rivest, R. L.,Sherman, A.,Chaum, D.(editors)(1982).Proceedings of CRYPTO`82.New York:Plenum Press.
-
D. Isenberg(2002).The GigaLaw-Guide to Internet Law.Random House Trade Paperbacks.
-
D. M. Kristol(2001).HTTP Cookies: Standards, privacy, and politics.ACM Transactions on Internet Technology,1(2),151-198.
-
E. Gabber,P. B. Gibbons,D. M. Kristol,Y. Matias,A. Mayer(1999).Consistent, yet anonymous, Web access with LPWA.Communications of the ACM,42(2),42-47.
-
Pretty poor privacy: An assessment of P3P and Internet privacy
-
European Union(1995).Directive 95/46/ec on the protection of individuals with regard to the processing of personal data and on the free movement of such data.Official Journal of the European Communities.
-
H. Burkert,Agre, P. E.,Rotenberg, M. (editors)(1997).Technology and privacy: the new landscape.Cambridge, MA, USA:MIT Press.
-
ISO/IEC(2005).Information Technology-Security Techniques-Information Security Management Systems-Code of practice for information security management.ISO/IEC 17799:2005.
-
ISO/IEC(2005).Information Technology-Security Techniques-Information Security Management Systems-Requirements.ISO/IEC FIDS 27001:2005.
-
J. Boyer(2001).Canonical XML.W3C Recommendation Version 1.0, W3C.
-
K. Bennett,C. Grothoff(2003).In Proceedings of the Third International Workshop on Privacy Enhancing Technologies (PET 2003), volume 2760 of Lecture Notes in Computer Science.Dresden, Germany:Springer-Verlag.
-
L. Cranor(2006).The platform for privacy preferences 1.1 (P3P 1.1) specification.Recommendations, World Wide Web Consortium.
-
L. Cranor,M. Langheinrich,M. Marchiori(2002).Working draft, World Wide Web Consortium.
-
L. Lessig(2000).Code and Other Laws of Cyberspace.Basic Books.
-
M. K. Reiter,A. D. Rubin(1998).Crowds: anonymity for web transactions.ACM Transactions on Information and System Security,1,66-92.
-
OECD(1980).OECD guidelines on the protection of privacy and transborder flows of personal data.Organization for Economic Cooperation and Development.
-
Proposed Standard
-
R. J. Hall(1998).How to avoid unwanted email.Communications of the ACM,41(3),88-95.
-
S. -C. Cha, Y. -J. Joung,Y. -E. Lue(2003).Building universal profile systems over a peer-to-peer network.In Proceedings of the Third IEEE Workshop on Internet Applications (WIAPP 2003),142-151.
-
S. -C. Cha,Y. -J. Joung(2002).Online personal data licensing.In Proceedings of the Third International Conference on Law and Technology (LawTech 2002),28-33.
-
Vance Lockton,Richard S. Rosenberg(2005).RFID: The next serious threat to privacy.Ethics and Information Technology,7,221-231.
-
Y.-J. Joung,C. Yen,C.-T. Huang,Y.-J. Huang(2005).Proceedings of the 29th International Computer Software and Applications Conference (COMPSAC 2005).IEEE Computer Society.
-
3小時1人被騙!電信業者幫兇排行榜
|