Sciweavers

239 search results - page 12 / 48
» Accountable Privacy
Sort
View
ICDCS
2002
IEEE
14 years 3 months ago
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns are taken into account early in the design proces...
Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, M....
TRUSTBUS
2009
Springer
14 years 5 months ago
An Anonymous Credit Card System
Abstract. Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to mon...
Elli Androulaki, Steven M. Bellovin
ICAIL
2007
ACM
14 years 2 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
ESORICS
2007
Springer
14 years 5 months ago
Conditional Privacy-Aware Role Based Access Control
Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adeq...
Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 10 months ago
Database Privacy
The emphasis in database privacy should fall on a balance between confidentiality, integrity and availability of personal data, rather than on confidentiality alone. This balance ...
Martin S. Olivier