Sciweavers

1663 search results - page 106 / 333
» Privacy and Identity Management
Sort
View
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
16 years 4 months ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...
ISW
2009
Springer
15 years 11 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
RTCSA
2007
IEEE
15 years 10 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
ACNS
2005
Springer
183views Cryptology» more  ACNS 2005»
15 years 10 months ago
Privacy Preserving Keyword Searches on Remote Encrypted Data
We consider the following problem: a user U wants to store his files in an encrypted form on a remote file server S. Later the user U wants to efficiently retrieve some of the en...
Yan-Cheng Chang, Michael Mitzenmacher
AGILEDC
2007
IEEE
15 years 10 months ago
Implementing Scrum in a Distributed Software Development Organization
This paper describes the start of the implementation of Scrum within BMC Software (Identity Management business unit). It describes the project, the project structure and the firs...
Hubert Smits, Guy Pshigoda