Sciweavers

346 search results - page 37 / 70
» A Privacy Policy Model for Enterprises
Sort
View
ICWS
2007
IEEE
13 years 9 months ago
Privacy-Aware Web Service Protocol Replaceability
Business protocols are becoming a necessary part of Web services description [4]. The work presented in [4] investigates mechanisms for analyzing the compatibility and the substit...
Nawal Guermouche, Salima Benbernou, Emmanuel Coque...
CHI
2005
ACM
14 years 8 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
EAAI
2008
115views more  EAAI 2008»
13 years 7 months ago
Supply chain coordination: A game-theory approach
In a supply chain organized as a network of autonomous enterprises, the main objective of each partner is to optimize his production and supply policy with respect to his own econ...
Jean-Claude Hennet, Yasemin Arda
ACISP
2010
Springer
13 years 9 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
ISSE
2010
13 years 6 months ago
A second look at Faster, Better, Cheaper
“Faster, Better, Cheaper” (FBC) was a systems development methodology used by NASA in the 1990s. While usually a deprecated practice, we find that, with certain caveats, it is...
Oussama El-Rawas, Tim Menzies