Sciweavers

1663 search results - page 100 / 333
» Privacy and Identity Management
Sort
View
EUC
2007
Springer
15 years 10 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
SAC
2005
ACM
15 years 10 months ago
SVD-based collaborative filtering with privacy
Collaborative filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar usersā...
Huseyin Polat, Wenliang Du
SAC
2004
ACM
15 years 10 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
CCS
2003
ACM
15 years 9 months ago
The blocker tag: selective blocking of RFID tags for consumer privacy
We propose the use of ā€œselective blockingā€ by ā€œblocker tagsā€ as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or...
Ari Juels, Ronald L. Rivest, Michael Szydlo
CIKM
2009
Springer
15 years 9 months ago
A novel approach for privacy mining of generic basic association rules
Data mining can extract important knowledge from large data collections - but sometimes these collections are split among various parties. Privacy concerns may prevent the parties...
Moez Waddey, Pascal Poncelet, Sadok Ben Yahia