Author:
Könings Bastian,Schaub Florian,Weber Michael
Publisher
Springer International Publishing
Reference76 articles.
1. Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, vol. 1, 9 pp. (2000). doi: 10.1109/HICSS.2000.926814
2. Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proceedings of the 10th International Conference on Information and Knowledge Management, pp. 310–317. ACM, Atlanta, Georgia (2001). doi: 10.1145/502585.502638 . http://www.portal.acm.org/citation.cfm?id=502638
3. An, X., Jutla, D., Cercone, N.: A Bayesian network approach to detecting privacy intrusion. In: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp. 73–76. IEEE Computer Society (2006)
4. Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL 1.2). Tech. Rep., W3C. http://www.w3.org/Submission/2003/SUBM-EPAL-20031110/ (2003)
5. Aztiria, A., Izaguirre, A., Augusto, J.C.: Learning patterns in ambient intelligence environments: a survey. Artif. Intell. Rev. 34(1), 35–51 (2010). doi: 10.1007/s10462-010-9160-3
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献