Sciweavers

806 search results - page 48 / 162
» Privacy Policy Referencing
Sort
View
ICIS
1993
13 years 11 months ago
Markets and Privacy
In this paper we experimentally compare the welfare efficiency of ‘information markets’ – markets where consumer information can be traded, to markets where no trade in info...
Kenneth C. Laudon
31
Voted
WPES
2005
ACM
14 years 3 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
BPM
2010
Springer
155views Business» more  BPM 2010»
13 years 11 months ago
PAPEL: A Language and Model for Provenance-Aware Policy Definition and Execution
The processing of data is often restricted by contractual and legal requirements for protecting privacy and IPRs. Policies provide means to control how and by whom data is processe...
Christoph Ringelstein, Steffen Staab
SRDS
2010
IEEE
13 years 7 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
IHI
2012
285views Healthcare» more  IHI 2012»
12 years 5 months ago
Towards HIPAA-compliant healthcare systems
In healthcare domain, there is a gap between healthcare systems and government regulations such as the Health Insurance Portability and Accountability Act (HIPAA). The violations ...
Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu