Sciweavers

243 search results - page 31 / 49
» Addressing privacy issues in CardSpace
Sort
View
IJMI
2007
134views more  IJMI 2007»
13 years 8 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll
TKDE
2008
119views more  TKDE 2008»
13 years 7 months ago
Anonymization by Local Recoding in Data with Attribute Hierarchical Taxonomies
Abstract--Individual privacy will be at risk if a published data set is not properly deidentified. k-Anonymity is a major technique to deidentify a data set. Among a number of k-an...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
WOA
2010
13 years 5 months ago
A Multi-Agent Implementation of Social Networks
In this paper, we present a multi-agent system implementing a fully distributed Social Network System supporting user profiles as FOAF profiles. This system is built around the ide...
Enrico Franchi
TDSC
2010
101views more  TDSC 2010»
13 years 2 months ago
Greedy Receivers in IEEE 802.11 Hotspots: Impacts and Detection
As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more bandwidth at the expense o...
Mi Kyung Han, Lili Qiu
CSE
2009
IEEE
14 years 2 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi