Sciweavers

666 search results - page 32 / 134
» Collaborative Planning With Privacy
Sort
View
BTW
2005
Springer
177views Database» more  BTW 2005»
14 years 2 months ago
Adaptive XML Access Control Based on Query Nesting, Modification and Simplification
: Access control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative acces...
Stefan Böttcher, Rita Steinmetz
CAISE
2006
Springer
14 years 23 days ago
Supporting Planned and Ad-Hoc Changes of Business Processes
Flexibility of business processes requires a modeling language that can distinguish between the stable and flexible parts of a business process. Starting from a general model of bu...
Peter Rittgen
GROUP
2005
ACM
14 years 2 months ago
Uncovering privacy attitudes and practices in instant messaging
We present an analysis of privacy attitudes and practices in Instant Messaging based on responses to an online questionnaire. On a 7point Likert scale, the reported concern about ...
Sameer Patil, Alfred Kobsa
GIS
2009
ACM
14 years 10 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
MIDDLEWARE
2009
Springer
14 years 3 months ago
Middleware for Pervasive Spaces: Balancing Privacy and Utility
Abstract. Middleware for pervasive spaces has to meet conflicting requirements. It has to both maximize the utility of the information exposed and ensure that this information doe...
Daniel Massaguer, Bijit Hore, Mamadou H. Diallo, S...