Sciweavers

1663 search results - page 47 / 333
» Privacy and Identity Management
Sort
View
SAFECOMP
2007
Springer
15 years 10 months ago
Formal Specification and Analysis of AFDX Redundancy Management Algorithms
Jan Täubrich, Reinhard von Hanxleden
110
Voted
WWW
2001
ACM
16 years 4 months ago
Establishing Persistent Identity using the Handle System
In this paper, we propose that identity reference used over distributed communication should be defined independent from any attributes and/or the public keys associated with the ...
Sam X. Sun
ESORICS
2008
Springer
15 years 5 months ago
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms
The rapid expansion of Internet based services has created opportunities for ICT firms to collect and use, in an unauthorized way, information about individuals (e.g. customers, pa...
Athanassios N. Yannacopoulos, Costas Lambrinoudaki...
ICIP
2008
IEEE
16 years 5 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...
UM
2005
Springer
15 years 9 months ago
Constraint-Sensitive Privacy Management for Personalized Web-Based Systems
This research aims at reconciling web personalization with privacy constraints imposed by legal restrictions and by users’ privacy preferences. We propose a software product line...
Yang Wang 0005