Sciweavers

1663 search results - page 60 / 333
» Privacy and Identity Management
Sort
View
CHI
2005
ACM
16 years 4 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
ICEIS
2008
IEEE
15 years 10 months ago
Hippocratic Multi-Agent Systems
The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive infor...
Ludivine Crépin, Laurent Vercouter, Olivier...
ESAW
2008
Springer
15 years 5 months ago
Sensitive Data Transaction in Hippocratic Multi-Agent Systems
The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive infor...
Ludivine Crépin, Yves Demazeau, Olivier Boi...
ENTCS
2008
130views more  ENTCS 2008»
15 years 4 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
ICMCS
2005
IEEE
110views Multimedia» more  ICMCS 2005»
15 years 9 months ago
License management scheme with anonymous trust for digital rights management
One of the major issues raised by Digital Rights Management systems concerns the protection of the user’s privacy and anonymous consumption of content. However, most existing li...
Jiang Zhang, Bin Li, Li Zhao, Shi-Qiang Yang