Sciweavers

1663 search results - page 50 / 333
» Privacy and Identity Management
Sort
View
SEC
2007
15 years 5 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
153
Voted
MHCI
2005
Springer
15 years 9 months ago
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Context-aware applications can better meet users’ needs when sensing agents installed in the environment automatically provide input relevant to the application. However, this n...
Dan Hong, Mingxuan Yuan, Vincent Y. Shen
ICDE
2005
IEEE
63views Database» more  ICDE 2005»
15 years 9 months ago
Privacy Contracts as an Extension of Privacy Policies
Individuals are becoming increasingly concerned regarding the protection of their personal information. In an attempt to ease the privacy concerns of individuals, organisations pu...
Hendrik J. G. Oberholzer, Martin S. Olivier
ESORICS
2004
Springer
15 years 9 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
130
Voted
AMI
2010
Springer
15 years 2 months ago
Dynamic Privacy Management in Pervasive Sensor Networks
This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our...
Nan-Wei Gong, Mathew Laibowitz, Joseph A. Paradiso