Sciweavers

201 search results - page 19 / 41
» Achieving Privacy in a Federated Identity Management System
Sort
View
ICDCS
2011
IEEE
12 years 6 months ago
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
— In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public...
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing...
ICDE
2000
IEEE
89views Database» more  ICDE 2000»
13 years 11 months ago
Managing Escalation of Collaboration Processes in Crisis Mitigation Situations
Processes for crisis mitigation must permit coordination flexibility and dynamic change to empower crisis mitigation coordinators and experts to deal with the unexpected situatio...
Dimitrios Georgakopoulos, Hans Schuster, Donald Ba...
TMC
2008
159views more  TMC 2008»
13 years 5 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
IFIPTM
2009
89views Management» more  IFIPTM 2009»
13 years 4 months ago
TIUPAM: A Framework for Trustworthiness-Centric Information Sharing
Abstract. Information is essential to decision making. Nowadays, decision makers are often overwhelmed with large volumes of information, some of which may be inaccurate, incorrect...
Shouhuai Xu, Ravi S. Sandhu, Elisa Bertino
PET
2010
Springer
13 years 10 months ago
Collaborative, Privacy-Preserving Data Aggregation at Scale
Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an acc...
Benny Applebaum, Haakon Ringberg, Michael J. Freed...