Sciweavers

1618 search results - page 195 / 324
» Privacy Interfaces for Information Management
Sort
View
ADB
1994
311views Database» more  ADB 1994»
15 years 8 months ago
A Personal and Portable Database Server: the CQL Card
Database applications and technologies are of central importance in many information systems a person may encounter. To obtain services, the end-users are required a smart card (pl...
Pierre Paradinas, Jean-Jacques Vandewalle
107
Voted
EDBT
2008
ACM
131views Database» more  EDBT 2008»
16 years 4 months ago
A Bayesian approach for on-line max and min auditing
In this paper we consider the on-line max and min query auditing problem: given a private association between fields in a data set, a sequence of max and min queries that have alr...
Gerardo Canfora, Bice Cavallo
139
Voted
HICSS
2007
IEEE
195views Biometrics» more  HICSS 2007»
15 years 10 months ago
Digital Relationships in the "MySpace" Generation: Results From a Qualitative Study
A qualitative study was conducted to explore how subjects use social networking sites and instant messenger to engage in interpersonal relationships. The results were used to deve...
Catherine Dwyer
126
Voted
SIGCSE
2006
ACM
144views Education» more  SIGCSE 2006»
15 years 10 months ago
Case-based analysis: a practical tool for teaching computer ethics
Case-based analysis is a bottom-up methodology for ethical reasoning. In a teaching environment, it can be a useful alternative to top-down methods, such as Kantianism, utilitaria...
Michael J. Quinn
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
15 years 9 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick