Sciweavers

239 search results - page 20 / 48
» Accountable Privacy
Sort
View
CORR
2011
Springer
142views Education» more  CORR 2011»
13 years 6 months ago
A Logical Method for Policy Enforcement over Evolving Audit Logs
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Priva...
Deepak Garg, Limin Jia, Anupam Datta
CODASPY
2012
12 years 6 months ago
Deriving implementation-level policies for usage control enforcement
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
Prachi Kumari, Alexander Pretschner
CCS
2010
ACM
13 years 11 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
SRDS
2010
IEEE
13 years 8 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
HICSS
2005
IEEE
100views Biometrics» more  HICSS 2005»
14 years 4 months ago
'Today' Messages: Lightweight Support for Small Group Awareness via Email
‘Today’ messages are short status emails sent daily by members of a project team. We present the results of a field study of the use of ‘today’ messages by six small work ...
A. J. Bernheim Brush, Alan Borning