Publisher
Springer Berlin Heidelberg
Reference132 articles.
1. Accorsi R (2012) A secure log architecture to support remote auditing. Math Comput Model 57(7–8):1578–1591
2. Accorsi R, Müller G (2013) Preventive inference control in data centric business. 2nd IEEE security and privacy. San Francisco, S 28–33
3. Accorsi R, Zimmermann C, Müller G (2012) On taming the inference threat in social networks. In: Privacy and data protection technology (PDPT). Amsterdam. https://staff.fnwi.uva.nl/g.j.vantnoordende/pdpt/2012/accorsi.pdf . S 1–5 Zugegriffen: 15. Mai 2016
4. Acquisti A (2009) Nudging privacy: the behavioral economics of personal information. IEEE Security & Priv 7(6):72–75
5. Acquisti A (2017) The economics of personal data and the economics of privacy. Carnegie Mellon University. http://repository.cmu.edu/heinzworks/332/ . Zugegriffen: 10. Mai 2016