Sciweavers

1663 search results - page 44 / 333
» Privacy and Identity Management
Sort
View
171
Voted
ESORICS
2003
Springer
15 years 9 months ago
A Toolkit for Managing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. An enterprise privacy policy often ...
Michael Backes, Birgit Pfitzmann, Matthias Schunte...
134
Voted
PET
2007
Springer
15 years 10 months ago
Enforcing P3P Policies Using a Digital Rights Management System
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that prote...
Farzad Salim, Nicholas Paul Sheppard, Reihaneh Saf...
CCS
2009
ACM
15 years 10 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
ISI
2005
Springer
15 years 9 months ago
Discovering Identity Problems: A Case Study
Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies...
Alan Gang Wang, Homa Atabakhsh, Tim Petersen, Hsin...
DIM
2006
ACM
15 years 10 months ago
User centricity: a taxonomy and open issues
User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity...
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas ...