Sciweavers

1663 search results - page 53 / 333
» Privacy and Identity Management
Sort
View
SEC
1996
15 years 5 months ago
Location management strategies increasing privacy in mobile communication
Mobile communication offers many new opportunities. However, because of the mobility of the subscribers trustworthiness of data, reliability and security are major issues. Our obj...
Dogan Kesdogan, Hannes Federrath, Anja Jerichow, A...
JTAER
2010
109views more  JTAER 2010»
15 years 2 months ago
A Flexible Architecture for Privacy-Aware Trust Management
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different pa...
Klemens Böhm, Sandro Etalle, Jerry den Hartog...
ATAL
2007
Springer
15 years 5 months ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh
ESAW
2006
Springer
15 years 7 months ago
Privacy Management in User-Centred Multi-agent Systems
Abstract. In all user-centred agent-based applications, for instance in the context of ambient computing, the user agent is often faced to a difficult trade-off between the protect...
Guillaume Piolle, Yves Demazeau, Jean Caelen
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
15 years 10 months ago
Privacy Protection: p-Sensitive k-Anonymity Property
In this paper, we introduce a new privacy protection property called p-sensitive k-anonymity. The existing kanonymity property protects against identity disclosure, but it fails t...
Traian Marius Truta, Bindu Vinay