Sciweavers

1663 search results - page 68 / 333
» Privacy and Identity Management
Sort
View
IEEEIAS
2007
IEEE
15 years 10 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
CHI
2002
ACM
16 years 4 months ago
Workshop: Creating and refining knowledges, identities, and understandings in on-line communities
This two-day workshop examines the ways that on-line communities create and refine their shared resources, including both the formal and observable artifacts (documents, chats, th...
Michael J. Muller, David R. Millen
CHI
2003
ACM
16 years 4 months ago
Unpacking "privacy" for a networked world
Although privacy is broadly recognized as a dominant concern for the development of novel interactive technologies, our ability to reason analytically about privacy in real settin...
Leysia Palen, Paul Dourish
PET
2004
Springer
15 years 9 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
MOBISYS
2008
ACM
16 years 3 months ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...