Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project, Journal of Computer Security, vol.18, issue.1, 2009. ,
DOI : 10.3233/JCS-2010-0367
The implications of users' privacy perception on communication and information privacy policies, Proceedings of Telecommunications Policy Research Conference, 1999. ,
Security without identification: Transaction systems to make big brother obsolete Distributed presence and community in cyberspace, Communications of the ACM, pp.1030-104412, 1985. ,
anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002. ,
DOI : 10.1145/586110.586114
Access control in a privacy-aware eLearning environment, First International Conference on Availability, Reliability and Security (ARES'06), pp.879-886, 2006. ,
DOI : 10.1109/ARES.2006.20
PRIME -Ein europäisches Projekt für nutzerbestimmtes Identitätsmanagement. it -Information Technology, pp.352-359, 2005. ,
DOI : 10.1524/itit.2005.47.6.352
Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet, 2008 IEEE Asia-Pacific Services Computing Conference, pp.1364-1368, 1971. ,
DOI : 10.1109/APSCC.2008.106
Privacy Awareness: A Means to Solve the Privacy Paradox?, IFIP Advances in Information and Communication Technology, pp.226-236, 2009. ,
DOI : 10.2307/1321160
Untersuchung des Einflusses von wahrgenommener Privatsphäre und Anonymität auf die Kommunikation in einer Online- Community, Gesellschaft fr Informatik. [PP09], pp.2152-2165, 2009. ,
A comparison of privacy issues in collaborative workspaces and social networks Identity in the Information Society Special Issue on Social Web and Identity Towards usable privacy for social software Supporting selective information sharing with people-tagging, Proceedings of the ACM CHI '08 Extended Abstracts on Human Factors in Computing Systems, 2007. ,
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, pp.29-41, 2005. ,
DOI : 10.1145/1057977.1057979
Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In RBAC '97: Proceedings of the second ACM workshop on Role-based access control, ACM. [Wor09] Online harassment and cyberstalking cumula- tive statistics for the years, pp.13-19, 1997. ,