Privacy practices of Internet users: Self-reports versus observed behavior, International Journal of Human-Computer Studies, vol.63, issue.1-2, pp.203-227, 2005. ,
DOI : 10.1016/j.ijhcs.2005.04.019
User interfaces for privacy agents, ACM Transactions on Computer-Human Interaction, vol.13, issue.2, pp.135-178, 2006. ,
DOI : 10.1145/1165734.1165735
Privacy and identity management for everyone, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.20-27, 2005. ,
DOI : 10.1145/1102486.1102491
Improving understanding of website privacy policies with fine-grained policy anchors, Proceedings of the 14th international conference on World Wide Web , WWW '05, pp.480-488, 2005. ,
DOI : 10.1145/1060745.1060816
Learning Privacy Preferences, 2011 Sixth International Conference on Availability, Reliability and Security, 2011. ,
DOI : 10.1109/ARES.2011.96
Privacy in e-commerce, Communications of the ACM, vol.48, issue.4, pp.101-106, 2005. ,
DOI : 10.1145/1053291.1053295
Personal privacy management for common users, International Journal of Smart Home, vol.3, issue.2, pp.89-106, 2009. ,
Second release of the policy engine Prime Life, OASIS eXtensible Access Control Markup Language (XACML), 2010. ,
An introduction to case-based reasoning, Artificial Intelligence Review, vol.13, issue.4, pp.3-34, 1992. ,
DOI : 10.1007/BF00155578
Case-based reasoning: Foundational issues, methodological variations, and system approaches, AI Communications, vol.7, issue.1, pp.39-59, 1994. ,
Distance-based indexing for high-dimensional metric spaces, ACM SIGMOD Record, vol.26, issue.2, pp.357-368, 1997. ,
DOI : 10.1145/253262.253345
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.1037
Coding Theory and Cryptography: The Essentials, 2000. ,
Efficient exact set-similarity joins, Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB) ,
How Similar Is It? Towards Personalized Similarity Measures in Ontologies, pp.1347-1366, 2005. ,
DOI : 10.1007/3-7908-1624-8_71
How internet users' privacy concerns have evolved since 2002, IEEE Security & Privacy Magazine, vol.8, issue.1, pp.21-27, 2010. ,
DOI : 10.1109/MSP.2010.38
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.585.7127
Ui prototypes: Policy administration and presentation version 1, Prime Life, 2009. ,