Sciweavers

2217 search results - page 194 / 444
» A Data Privacy Taxonomy
Sort
View
IEEEARES
2008
IEEE
15 years 10 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
CSFW
2007
IEEE
15 years 10 months ago
The Insecurity Problem: Tackling Unbounded Data
In this paper we focus on tackling the insecurity problem of security protocols in the presence of an unbounded number of data such as nonces or session keys. First, we pinpoint f...
Sibylle B. Fröschle
CCS
2006
ACM
15 years 7 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
SSWMC
2004
15 years 5 months ago
Security for biometric data
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
Claus Vielhauer, Ton Kalker
ESORICS
2009
Springer
16 years 4 months ago
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
Tiancheng Li, Xiaonan Ma, Ninghui Li