Sciweavers

186 search results - page 23 / 38
» Managing privacy preferences for federated identity manageme...
Sort
View
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
14 years 7 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi
HUC
2005
Springer
14 years 1 months ago
DigiDress: A Field Trial of an Expressive Social Proximity Application
In May 2005 Nokia Sensor application (www.nokia.com/sensor) was launched, allowing mobile phone users to create digital identity expressions, seen by other users within Bluetooth r...
Per Persson, Jan Blom, Younghee Jung
EUC
2008
Springer
13 years 9 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 2 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
IFIPTM
2009
89views Management» more  IFIPTM 2009»
13 years 5 months ago
TIUPAM: A Framework for Trustworthiness-Centric Information Sharing
Abstract. Information is essential to decision making. Nowadays, decision makers are often overwhelmed with large volumes of information, some of which may be inaccurate, incorrect...
Shouhuai Xu, Ravi S. Sandhu, Elisa Bertino