[1] Warren S D, Brandeis L D. The right to privacy[J]. Harvard Law Review, 1985,4(5):193-220.
[2] Westin A F. Privacy and Freedom[M]. New York: Atheneum, 1967.
[3] Nissenbaum H. Privacy ascontextual integrity[J]. Washington Law Review, 2004,79(1):119-157.
[4] Solove D J. A taxonomy of privacy[J]. University of Pennsylvania Law Review, 2006,154(3):477-564.
[5] Bansal G, Zahedi F M, Gefen D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online[J]. Decision Support Systems, 2010,49(2):138-150.
[6] 柯昌博,黄志球. 云计算环境下隐私需求的描述与检测方法[J]. 计算机研究与发展, 2015,52(4):879-888.
[7] 贾哲,黄志球,王珊珊,等. 支持本体推理的P3P隐私策略冲突检测研究[J]. 计算机科学与探索, 2013,7(1):74-82.
[8] Lu Jiajun, Huang Zhiqiu, Ke Changbo. Verification of behavior-aware privacy requirements in Web services composition[J]. Journal of Software, 2014,9(4):944-951.
[9] Barth A, Datta A, Mitchell J C, et al. Privacy and contextual integrity: Framework and applications[C]// 2006 IEEE Symposium on Security and Privacy (S&P’06). 2006:184-198.
[10]Becker M Y, Malkis A, Bussard L. S4P: A generic language for specifying privacy preferences and policies[Z]. Microsoft Research, 2010.
[11]王进,黄志球. 云计算中隐私需求的建模与一致性检测[J]. 计算机研究与发展, 2015,52(10):2395-2410.
[12]Mokhtari K, Benbernou S, Said M, et al. Verification of privacy timed properties in Web service protocols[C]// IEEE International Conference on Services Computing. 2008,2:593-594.
[13] Mokhtari K, Benbernou S, Rouached M, et al. Privacytime-related analysis in business protocols[C]// IEEE International Conference on Web Services. IEEE, 2009:141-148.
[14]Mokhtari-Aslaoui K, Benbernou S, Sahri S, et al. Timed privacy-aware business protocols[J]. International Journal of Cooperative Information Systems, 2012,21(2):85-109.
[15]Montali M. Specification and Verification of Declarative Open Interaction Models—A Logic-based Approach[M]. Springer Verlag, 2010. |