Sciweavers

2217 search results - page 178 / 444
» A Data Privacy Taxonomy
Sort
View
CCS
2008
ACM
15 years 6 months ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...
CCS
2008
ACM
15 years 6 months ago
Rootkit-resistant disks
Rootkits are now prevalent in the wild. Users affected by rootkits are subject to the abuse of their data and resources, often unknowingly. Such malware becomes even more dangerou...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
139
Voted
GIL
2009
15 years 1 months ago
The Need for Content-lists, Dictionaries and Ontologies in Expressing and Evaluating Compliance to Crop-production Regulations,
: Regulations and standards are playing an increasingly important role in crop production. Common to the vast majority of these is that they are written in a natural language which...
Edward Nash
128
Voted
PERCOM
2010
ACM
15 years 2 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han
133
Voted
VIS
2007
IEEE
86views Visualization» more  VIS 2007»
16 years 5 months ago
Illustrative Deformation for Data Exploration
Abstract--Much of the visualization research has focused on improving the rendering quality and speed, and enhancing the perceptibility of features in the data. Recently, significa...
Carlos Correa, Deborah Silver, Min Chen