Sciweavers

133 search results - page 12 / 27
» Constraint-Sensitive Privacy Management for Personalized Web...
Sort
View
CIKM
2008
Springer
13 years 9 months ago
Tag data and personalized information retrieval
Researchers investigating personalization techniques for Web Information Retrieval face a challenge; that the data required to perform evaluations, namely query logs and clickthro...
Mark James Carman, Mark Baillie, Fabio Crestani
CHI
2003
ACM
14 years 8 months ago
Who wants to know what when? privacy preference determinants in ubiquitous computing
We conducted a questionnaire-based study of the relative importance of two factors, inquirer and situation, in determining the preferred accuracy of personal information disclosed...
Scott Lederer, Jennifer Mankoff, Anind K. Dey
DIM
2005
ACM
13 years 9 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
UCS
2007
Springer
14 years 1 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
13 years 11 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson