Sciweavers

1663 search results - page 107 / 333
» Privacy and Identity Management
Sort
View
KDD
2003
ACM
210views Data Mining» more  KDD 2003»
16 years 4 months ago
Privacy-preserving k-means clustering over vertically partitioned data
Privacy and security concerns can prevent sharing of data, derailing data mining projects. Distributed knowledge discovery, if done correctly, can alleviate this problem. The key ...
Jaideep Vaidya, Chris Clifton
JSS
2002
96views more  JSS 2002»
15 years 4 months ago
A group signature scheme with strong separability
Group signatures, introduced by Chaum and van Heijst, allow members of a group to sign messages anonymously on behalf of the group. Only a designated group manager is able to iden...
Shundong Xia, Jinyuan You
IH
1998
Springer
15 years 8 months ago
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System
Abstract. Currently knownbasic anonymitytechniques dependon identity veri cation. If veri cation of user identities is not possible due to the related management overhead or a gene...
Dogan Kesdogan, Jan Egner, Roland Büschkes
ASIAN
2006
Springer
131views Algorithms» more  ASIAN 2006»
15 years 8 months ago
FORM : A Federated Rights Expression Model for Open DRM Frameworks
Abstract. Digital Rights Management frameworks (DRM) aim at protecting and controlling information contents widely distributed on client devices. Using a license, the content provi...
Thierry Sans, Frédéric Cuppens, Nora...
ACSAC
2003
IEEE
15 years 9 months ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello