Sciweavers

497 search results - page 15 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
ESORICS
2006
Springer
13 years 11 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
PERCOM
2003
ACM
14 years 7 months ago
A High Performance Privacy-Oriented Location System
Many mobile applications can be greatly enhanced when provided with the locations of people and devices. Ultrasonic location systems have been shown to supply location information...
Mike Hazas, Andy Ward
ISECS
2008
IEEE
14 years 1 months ago
Assessing the Impact of Information Technology on Supply Chain Management
: Companies attempt to companies are attempting to find ways to improve their flexibility and responsiveness and in turn competitiveness by changing their operations strategy, meth...
Mehdi Fasanghari
ICDCIT
2004
Springer
14 years 24 days ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
IADIS
2004
13 years 8 months ago
Authorization of User Profile Access in Identity Management
Distributed management of user profiles and identities allow reuse of profile information for different personalization services but also raises privacy issues. Users need a possi...
Wolfgang Woerndl