Sciweavers

5255 search results - page 51 / 1051
» Formal Methods for Privacy
Sort
View
CCS
2009
ACM
14 years 4 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
IEEEIAS
2007
IEEE
14 years 4 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
ICFCA
2004
Springer
14 years 3 months ago
Signs and Formal Concepts
Uta Priss