Sciweavers

392 search results - page 24 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
CSE
2009
IEEE
14 years 5 months ago
Solutions to Security and Privacy Issues in Mobile Social Networking
—Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable of running applicati...
Aaron Beach, Mike Gartrell, Richard Han
HYBRID
1998
Springer
14 years 2 months ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch
MSWIM
2005
ACM
14 years 4 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
GRC
2007
IEEE
13 years 10 months ago
Privacy Preserving Collaborative Filtering Using Data Obfuscation
Collaborative filtering (CF) systems are being widely used in E-commerce applications to provide recommendations to users regarding products that might be of interest to them. Th...
Rupa Parameswaran, Douglas M. Blough
ICPR
2010
IEEE
14 years 2 months ago
Non-Parametric 3D Shape Warping
— A method is presented for non-rigid alignment of a source shape to a target shape through estimating and interpolating point-wise correspondences between their surfaces given a...
Ulrich Hillenbrand