Sciweavers

44 search results - page 5 / 9
» A Framework for the User-Oriented Personal Information Prote...
Sort
View
TRUSTBUS
2010
Springer
13 years 7 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall
CLIMA
2007
13 years 10 months ago
Fuzzy Argumentation for Trust
In an open Multi-Agent System, the goals of agents acting on behalf of their owners often conflict with each other. Therefore, a personal agent protecting the interest of a single...
Ruben Stranders, Mathijs de Weerdt, Cees Witteveen
PUC
2006
89views more  PUC 2006»
13 years 8 months ago
Using ubiquitous computing in interactive mobile marketing
Unique features of handheld devices, including their mobility, personalization and location-awareness engender new types of applications for mobile commerce, such as mobile adverti...
Stan Kurkovsky, Karthik Harihar
ECAI
2008
Springer
13 years 10 months ago
Privacy-Preserving Query Answering in Logic-based Information Systems
Abstract. We study privacy guarantees for the owner of an information system who wants to share some of the information in the system with clients while keeping some other informat...
Bernardo Cuenca Grau, Ian Horrocks
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes