Sciweavers

2217 search results - page 422 / 444
» A Data Privacy Taxonomy
Sort
View
128
Voted
CSCW
2008
ACM
15 years 5 months ago
Changes in use and perception of facebook
As social computing systems persist over time, the user experiences and interactions they support may change. One type of social computing system, Social Network Sites (SNSs), are...
Cliff Lampe, Nicole Ellison, Charles Steinfield
143
Voted
EUC
2008
Springer
15 years 5 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
142
Voted
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
15 years 5 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
154
Voted
PDPTA
2004
15 years 5 months ago
Semantic Extensions for the Virtual Enterprise's Grid Infastructure
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows collab...
Ziga Turk, Vlado Stankovski, Matevz Dolenc, Tomo C...
141
Voted
ACCV
2009
Springer
15 years 4 months ago
Person De-identification in Videos
Advances in cameras and web technology have made it easy to capture and share large amounts of video data over to a large number of people. A large number of cameras oversee public...
Prachi Agrawal, P. J. Narayanan