Sciweavers

806 search results - page 38 / 162
» Privacy Policy Referencing
Sort
View
PDCAT
2007
Springer
15 years 10 months ago
Monitoring Employees' Emails without Violating Their Privacy Right
The capability of an employee to violate the policy of an organization is a concern for an employer. Monitoring is a measure taken by an employer to discourage an employee from ac...
Giannakis Antoniou, Parampalli Udaya, Lynn Margare...
143
Voted
NSDI
2010
15 years 5 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
155
Voted
ICDE
2007
IEEE
128views Database» more  ICDE 2007»
15 years 7 months ago
Realizing Privacy-Preserving Features in Hippocratic Databases
Preserving privacy has become a crucial requirement for operating a business that manages personal data. Hippocratic databases have been proposed to answer this requirement throug...
Yasin Laura-Silva, Walid G. Aref
ICASSP
2011
IEEE
14 years 7 months ago
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage
A rechargeable battery may be used to partially protect the privacy of information contained in a household’s electrical load profile. We represent the system as a finite stat...
David P. Varodayan, Ashish Khisti
CCS
2008
ACM
15 years 5 months ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...