Sciweavers

1906 search results - page 315 / 382
» Data Privacy
Sort
View
139
Voted
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
15 years 6 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
139
Voted
BIOID
2008
134views Biometrics» more  BIOID 2008»
15 years 4 months ago
Advanced Studies on Reproducibility of Biometric Hashes
The determination of hashes based on biometric data is a recent topic in biometrics as it allows to handle biometric templates in a privacy manner. Applications could be the genera...
Tobias Scheidat, Claus Vielhauer, Jana Dittmann
SOUPS
2009
ACM
15 years 9 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
111
Voted
ACSAC
2006
IEEE
15 years 8 months ago
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software
Address space randomization is an emerging and promising method for stopping a broad range of memory corruption attacks. By randomly shifting critical memory regions at process in...
Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, ...
HIKM
2006
ACM
15 years 8 months ago
A flexible approach for electronic medical records exchange
Many methodologies have been proposed in the last decade for integration and exchange of medical data. However, little progress has occurred due to the following reasons. First, p...
Vagelis Hristidis, Peter J. Clarke, Nagarajan Prab...