Sciweavers

1663 search results - page 120 / 333
» Privacy and Identity Management
Sort
View
154
Voted
IADIS
2003
15 years 5 months ago
User Profile Based Smart Information Filtering in Smartcard
Finding effectively relevant information is becoming challenging task. In this paper, we propose a smart information filtering system SIM-Filter that integrates user’s identity ...
Abdelkrim Lahlou, Pascal Urien
147
Voted
AIL
2004
111views more  AIL 2004»
15 years 4 months ago
Anonymity and software agents: An interdisciplinary challenge
Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit ...
Frances M. T. Brazier, Anja Oskamp, Corien Prins, ...
ACSAC
2001
IEEE
15 years 8 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
115
Voted
CCS
2009
ACM
15 years 11 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
ICDM
2006
IEEE
93views Data Mining» more  ICDM 2006»
15 years 10 months ago
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks
Recently K-anonymity has gained popularity as a privacy quantification against linking attacks, in which attackers try to identify a record with values of some identifying attrib...
Zhouxuan Teng, Wenliang Du