Sciweavers

578 search results - page 7 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
JIB
2007
121views more  JIB 2007»
13 years 7 months ago
Deriving biological applications from domain specific process models
In this paper we present how the process modeling and execution tools iPM and iPE can be used to model and execute biological processes. The main focus of this paper is on the fle...
Stefan Jablonski, Matthias Färber, Bernhard V...
JAMIA
2011
140views more  JAMIA 2011»
12 years 10 months ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
AAAI
2011
12 years 7 months ago
User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models
With smart-phones becoming increasingly commonplace, there has been a subsequent surge in applications that continuously track the location of users. However, serious privacy conc...
Justin Cranshaw, Jonathan Mugan, Norman M. Sadeh
ESORICS
2010
Springer
13 years 8 months ago
An Authorization Framework Resilient to Policy Evaluation Failures
Abstract. In distributed computer systems, it is possible that the evaluation of an authorization policy may suffer unexpected failures, perhaps because a sub-policy cannot be eval...
Jason Crampton, Michael Huth
SACMAT
2009
ACM
14 years 2 months ago
A semantic web based framework for social network access control
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...