Sciweavers

806 search results - page 40 / 162
» Privacy Policy Referencing
Sort
View
IEEEARES
2007
IEEE
14 years 4 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
DRM
2009
Springer
14 years 4 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacriļ¬...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
MHCI
2005
Springer
14 years 3 months ago
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Context-aware applications can better meet usersā€™ needs when sensing agents installed in the environment automatically provide input relevant to the application. However, this n...
Dan Hong, Mingxuan Yuan, Vincent Y. Shen
ECIS
2001
13 years 11 months ago
Cyberliability: Is the Chief Privacy Officer the Solution?
The primary responsibility of the Chief Privacy Officer (CPO) is to protect online consumer privacy by developing an organization's privacy policy and ensuring compliance wit...
Janice C. Sipior, Burke T. Ward
IEEEARES
2006
IEEE
14 years 4 months ago
Supporting Attribute-based Access Control with Ontologies
In highly open systems like the Internet, attribute-based access control (ABAC) has proven its appropriateness. The speciļ¬cation and maintenance of ABAC policies however has tur...
Torsten Priebe, Wolfgang Dobmeier, Nora Kamprath