Sciweavers

184 search results - page 9 / 37
» A TMDM Disclosure Using T
Sort
View
ATAL
2000
Springer
13 years 12 months ago
Layered Disclosure: Revealing Agents' Internals
A perennial challenge in creating and using complex autonomous agents is following their choices of actions as the world changes dynamically and understanding why they act as they ...
Patrick Riley, Peter Stone, Manuela M. Veloso
EDBTW
2010
Springer
14 years 2 months ago
A method for evaluating marketer re-identification risk
Disclosures of health databases for secondary purposes is increasing rapidly. In this paper, we develop and evaluate a reidentification risk metric for the case where an intruder ...
Fida Kamal Dankar, Khaled El Emam
DRM
2006
Springer
13 years 11 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
IJMI
2007
140views more  IJMI 2007»
13 years 7 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
PERVASIVE
2005
Springer
14 years 1 months ago
Social Disclosure of Place: From Location Technology to Communication Practices
Communication of one’s location as part of a social discourse is common practice, and we use a variety of technologies to satisfy this need. This practice suggests a potentially ...
Ian E. Smith, Sunny Consolvo, Anthony LaMarca, Jef...