Information Technology Reference
In-Depth Information
end-users and elicit policy settings; investigating the best design patterns for inter-cell
management; how to specify and implement privacy policies that allow users to con-
trol access to personal information, and what mechanisms to use to anonymise per-
sonal information and prevent tracking.
Acknowledgments
The authors wish to thank the UK Engineering and Physical Sciences Research Coun-
cil for their support of this research through grants GR/S68040/01 and
GR/S68033/01.
 
Search WWH ::




Custom Search