security and privacy for medical implantable devices
Context Fabric: Privacy Support for Ubiquitous Computing
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Digital Consent: Taking UMA from Concept to Reality
Introduction Wireless Comm Ppt
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Data Sharing)
Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 1 Visualizing Privacy II.
Dan Boneh [email protected] with Monica Lam, David Mazieres, John Mitchell, and many students. Security for Mobile Devices NSF Site Visit, June 2010.
Toward Privacy in Public Databases Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith, Larry Stockmeyer, Hoeteck Wee Work Done at Microsoft Research.
Context Fabric: Privacy Support for Ubiquitous Computing Jason I. Hong G r o u p f o r User Interface Research University of California Berkeley.
Dan Boneh [email protected] with Monica Lam, David Mazieres , John Mitchell, and many students.