Sciweavers

578 search results - page 22 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
ESA
2006
Springer
136views Algorithms» more  ESA 2006»
13 years 11 months ago
Approximation in Preemptive Stochastic Online Scheduling
Abstract. We present a first constant performance guarantee for preemptive stochastic scheduling to minimize the sum of weighted completion times. For scheduling jobs with release ...
Nicole Megow, Tjark Vredeveld
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
14 years 8 months ago
Privacy-Preserving Data Mining through Knowledge Model Sharing
Privacy-preserving data mining (PPDM) is an important topic to both industry and academia. In general there are two approaches to tackling PPDM, one is statistics-based and the oth...
Patrick Sharkey, Hongwei Tian, Weining Zhang, Shou...
DRM
2006
Springer
13 years 11 months ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver
IEEEARES
2007
IEEE
14 years 1 months ago
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems
Access control in decentralised collaborative systems present huge challenges especially where many autonomous entities including organisations, humans, software agents from diff...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
SDMW
2009
Springer
14 years 2 months ago
An Access Control Language for a General Provenance Model
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...