Sciweavers

1457 search results - page 17 / 292
» Privacy Challenges for Database Systems
Sort
View
COMCOM
2010
148views more  COMCOM 2010»
13 years 7 months ago
Privacy versus scalability in radio frequency identification systems
Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-o...
Basel Alomair, Radha Poovendran
PET
2004
Springer
14 years 3 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
SIGMOD
2011
ACM
189views Database» more  SIGMOD 2011»
13 years 1 months ago
We challenge you to certify your updates
Correctness of data residing in a database is vital. While integrity constraint enforcement can often ensure data consistency, it is inadequate to protect against updates that inv...
Su Chen, Xin Luna Dong, Laks V. S. Lakshmanan, Div...
SSD
2009
Springer
126views Database» more  SSD 2009»
14 years 4 months ago
A Location Privacy Aware Friend Locator
A location-based service called friend-locator notifies a user if the user is geographically close to any of the user’s friends. Services of this kind are getting increasingly p...
Laurynas Siksnys, Jeppe R. Thomsen, Simonas Salten...
CCS
2007
ACM
14 years 4 months ago
A calculus of challenges and responses
er presents a novel approach for concisely abstracting authentication s and for subsequently analyzing those abstractions in a sound manner, i.e., deriving authentication guarante...
Michael Backes, Agostino Cortesi, Riccardo Focardi...