Privacy and Trust Issues with Invisible Computers

S. Lahlou, M. Langheinrich, C. Röcker, Communications of the ACM 48 (2005) 59 – 60.

Download (ext.)
OA
Zeitschriftenaufsatz | Veröffentlicht | Englisch
Autor*in
; ;
Abstract
A set of designer guidelines from the European Union offers the first step in building privacy-aware systems.
Erscheinungsjahr
Zeitschriftentitel
Communications of the ACM
Band
48
Zeitschriftennummer
3
Seite
59 – 60
ISSN
eISSN
ELSA-ID

Zitieren

Lahlou S, Langheinrich M, Röcker C. Privacy and Trust Issues with Invisible Computers. Communications of the ACM. 2005;48(3):59 – 60. doi:10.1145/1047671.1047705
Lahlou, S., Langheinrich, M., & Röcker, C. (2005). Privacy and Trust Issues with Invisible Computers. Communications of the ACM, 48(3), 59 – 60. https://doi.org/10.1145/1047671.1047705
Lahlou S, Langheinrich M and Röcker C (2005) Privacy and Trust Issues with Invisible Computers. Communications of the ACM 48, 59 – 60.
Lahlou, Saadi, Marc Langheinrich, and Carsten Röcker. “Privacy and Trust Issues with Invisible Computers.” Communications of the ACM 48, no. 3 (2005): 59 – 60. https://doi.org/10.1145/1047671.1047705.
Lahlou, Saadi, Marc Langheinrich und Carsten Röcker. 2005. Privacy and Trust Issues with Invisible Computers. Communications of the ACM 48, Nr. 3: 59 – 60. doi:10.1145/1047671.1047705, .
Lahlou, Saadi ; Langheinrich, Marc ; Röcker, Carsten: Privacy and Trust Issues with Invisible Computers. In: Communications of the ACM Bd. 48. New York, ACM (2005), Nr. 3, S. 59 – 60
S. Lahlou, M. Langheinrich, C. Röcker, Privacy and Trust Issues with Invisible Computers, Communications of the ACM. 48 (2005) 59 – 60.
S. Lahlou, M. Langheinrich, and C. Röcker, “Privacy and Trust Issues with Invisible Computers,” Communications of the ACM, vol. 48, no. 3, pp. 59 – 60, 2005.
Lahlou, Saadi, et al. “Privacy and Trust Issues with Invisible Computers.” Communications of the ACM, vol. 48, no. 3, ACM, 2005, pp. 59 – 60, doi:10.1145/1047671.1047705.
Lahlou, Saadi et. al. (2005): Privacy and Trust Issues with Invisible Computers, in: Communications of the ACM 48 (3), S. 59 – 60.
Lahlou S, Langheinrich M, Röcker C. Privacy and Trust Issues with Invisible Computers. Communications of the ACM. 2005;48(3):59 – 60.
Alle Dateien verfügbar unter der/den folgenden Lizenz(en):
forms.journal_article.field.license.oa_license.label:
forms.journal_article.field.license.oa_license.text [...]

Link(s) zu Volltext(en)
URL
Access Level
Restricted Closed Access

Export

Markierte Publikationen

Open Data ELSA

Suchen in

Google Scholar