Sciweavers

599 search results - page 15 / 120
» Managing Privacy in LBAC Systems
Sort
View
CIDR
2007
113views Algorithms» more  CIDR 2007»
13 years 10 months ago
Securing history: Privacy and accountability in database systems
Databases that preserve a historical record of activities and data offer the important benefit of system accountability: past events can be analyzed to detect breaches and maint...
Gerome Miklau, Brian Neil Levine, Patrick Stahlber...
ECIS
2003
13 years 9 months ago
Meeting privacy obligations: the implications for information systems development
The European Union(EU) Data Protection (Privacy) Directive of 1995 (EUPD) and resulting legislation introduced by member states is designed to ensure that business activity is sub...
Reeva M. Lederman, Graeme G. Shanks, Martin R. Gib...
CSREASAM
2010
13 years 6 months ago
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation
We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi...
Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey K...
EDBTW
2010
Springer
14 years 3 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
INFOCOM
2009
IEEE
14 years 3 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu