Sciweavers

515 search results - page 88 / 103
» Measuring Voter-Controlled Privacy
Sort
View
NSPW
2006
ACM
14 years 3 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti
GLOBECOM
2009
IEEE
14 years 4 months ago
Anonymous Cardinality Estimation in RFID Systems with Multiple Readers
— In this paper, we study the anonymous cardinality estimation problem in radio frequency identification (RFID) systems. To preserve privacy and anonymity, each tag only transmi...
Vahid Shah-Mansouri, Vincent W. S. Wong
TRUST
2009
Springer
14 years 4 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
SACMAT
2004
ACM
14 years 3 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
ISI
2004
Springer
14 years 3 months ago
Analyzing and Visualizing Criminal Network Dynamics: A Case Study
Dynamic criminal network analysis is important for national security but also very challenging. However, little research has been done in this area. In this paper we propose to use...
Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, H...