Sciweavers

1779 search results - page 294 / 356
» A Formal Model of Data Privacy
Sort
View
99
Voted
EDBT
2006
ACM
118views Database» more  EDBT 2006»
16 years 4 months ago
On Honesty in Sovereign Information Sharing
Abstract. We study the following problem in a sovereign informationsharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave hone...
Rakesh Agrawal, Evimaria Terzi
130
Voted
IAT
2005
IEEE
15 years 9 months ago
Sharing Engineering Information and Knowledge
This paper describes an agent-based recommendation system developed to support knowledge acquisition and sharing processes. Its purpose is to aid the process of community building...
Mauro F. Koyama, Olga Nabuco, Francisco Edeneziano...
OOPSLA
2004
Springer
15 years 9 months ago
Modular generics
This paper presents the design of G, a new language specifically created for generic programming. We review and identify important language features of C++ and Haskell in light o...
Jeremy G. Siek
ISI
2003
Springer
15 years 9 months ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
15 years 5 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...