Sciweavers

1663 search results - page 126 / 333
» Privacy and Identity Management
Sort
View
130
Voted
EGOV
2009
Springer
15 years 8 months ago
Mapping the E-Government Research with Social Network Analysis
About fifteen years of e-government research (EGR) lead to a research field that is looking forward to define an identity as a proper and autonomous scientific discipline. This pap...
Nusa Erman, Ljupco Todorovski
EUROSSC
2006
Springer
15 years 8 months ago
Dynamic Bayesian Networks for Visual Surveillance with Distributed Cameras
Abstract. This paper presents a surveillance system for tracking multiple people through a wide area with sparsely distributed cameras. The computational core of the system is an a...
Wojciech Zajdel, Ali Taylan Cemgil, Ben J. A. Kr&o...
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 11 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
ACSAC
1999
IEEE
15 years 9 months ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin
AGENTS
1999
Springer
15 years 8 months ago
Agent Development with Jackal
Jackal is a Java-based tool for communicatingwith the KQML agent communication language. Some features that make it extremely valuable to agent development are its conversation ma...
R. Scott Cost, Timothy W. Finin, Yannis Labrou, Xi...