Sciweavers

239 search results - page 23 / 48
» Accountable Privacy
Sort
View
WCNC
2010
IEEE
14 years 2 months ago
V-Tokens for Conditional Pseudonymity in VANETs
—Privacy is an important requirement in vehicle networks, because vehicles broadcast detailed location information. Also of importance is accountability due to safety critical ap...
Florian Schaub, Frank Kargl, Zhendong Ma, Michael ...
CSFW
2011
IEEE
12 years 10 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi
ISI
2006
Springer
13 years 11 months ago
Visualizing Authorship for Identification
As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this stu...
Ahmed Abbasi, Hsinchun Chen
RE
2006
Springer
13 years 10 months ago
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations
In the United States, federal and state regulations prescribe stakeholder rights and obligations that must be satisfied by the requirements for software systems. These regulations ...
Travis D. Breaux, Matthew W. Vail, Annie I. Ant&oa...
SICHERHEIT
2010
13 years 8 months ago
A Fuzzy Model for IT Security Investments
: This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed m...
Guido Schryen