Sciweavers

184 search results - page 27 / 37
» A TMDM Disclosure Using T
Sort
View
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 4 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
SOUPS
2009
ACM
14 years 2 months ago
Analyzing use of privacy policy attributes in a location sharing application
Privacy in location sharing applications is particularly important due to the sensitivity of users’ geographical location. Privacy in most location sharing applications is provi...
Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cr...
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
WWW
2003
ACM
14 years 8 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
CSCW
2010
ACM
14 years 4 months ago
Social use of computer-mediated communication by adults on the autism spectrum
The defining characteristics of autism, including difficulty with nonverbal cues and need for structure, and the defining characteristics of computer-mediated communication (CMC),...
Moira Burke, Robert Kraut, Diane Williams