Sciweavers

181 search results - page 3 / 37
» Analyzing Regulatory Rules for Privacy and Security Requirem...
Sort
View
IEEEARES
2008
IEEE
14 years 1 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
WPES
2003
ACM
14 years 23 days ago
Privacy preserving database application testing
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
Xintao Wu, Yongge Wang, Yuliang Zheng
ESORICS
2009
Springer
14 years 8 months ago
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
Tiancheng Li, Xiaonan Ma, Ninghui Li
SOUPS
2009
ACM
14 years 2 months ago
Analyzing use of privacy policy attributes in a location sharing application
Privacy in location sharing applications is particularly important due to the sensitivity of users’ geographical location. Privacy in most location sharing applications is provi...
Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cr...
SOUPS
2005
ACM
14 years 1 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...