Sciweavers

3299 search results - page 45 / 660
» Privacy and Trusted Computing
Sort
View
SACMAT
2004
ACM
14 years 2 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...
ESORICS
2009
Springer
14 years 3 months ago
A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search
For nearest neighbor search, a user queries a server for nearby points of interest (POIs) with his/her location information. Our aim is to protect the user’s sensitive informatio...
Hyoungshick Kim
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
HICSS
2007
IEEE
96views Biometrics» more  HICSS 2007»
14 years 3 months ago
Information Privacy and Trust in Government: a citizen-based perspective from New Zealand
Increasing use of e-government has raised issues about the privacy of information provided by citizens to government. This paper explores the experiences and concerns of New Zeala...
Rowena Cullen, Patrick Reilly
IEEEIAS
2008
IEEE
14 years 3 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina