Sciweavers

3155 search results - page 231 / 631
» How Are You Doing
Sort
View
ASWEC
2007
IEEE
14 years 4 months ago
Prerequisites for Successful Architectural Knowledge Sharing
Sharing knowledge pertaining to software architectures becomes increasingly important. If this knowledge is not explicitly stored or communicated, valuable knowledge dissipates. H...
Rik Farenhorst, Patricia Lago, Hans van Vliet
DASFAA
2007
IEEE
163views Database» more  DASFAA 2007»
14 years 4 months ago
Protecting Individual Information Against Inference Attacks in Data Publishing
In many data-publishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. T...
Chen Li, Houtan Shirani-Mehr, Xiaochun Yang
HICSS
2007
IEEE
131views Biometrics» more  HICSS 2007»
14 years 4 months ago
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System
Online banking has become increasingly important to the profitability of financial institutions as well as adding convenience for their customers. As the number of customers using...
Kenneth S. Edge, Richard A. Raines, Michael R. Gri...
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 4 months ago
Distributed Privacy-Preserving Policy Reconciliation
— Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, what protocols are to be used, who i...
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
CONTEXT
2007
Springer
14 years 3 months ago
Explanations and Context in Ambient Intelligent Systems
Ambient intelligent systems are context aware by perceiving and reasoning about their environment, they perceive the needs of their users and proactively respond to these needs by ...
Anders Kofod-Petersen, Jörg Cassens