Sciweavers

240 search results - page 14 / 48
» Privacy and Utility in Business Processes
Sort
View
CAISE
2007
Springer
14 years 5 months ago
Conceptual Modeling of Privacy-Aware Web Service Protocols
Abstract. Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stor...
Rachid Hamadi, Hye-Young Paik, Boualem Benatallah
CHI
2005
ACM
14 years 11 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
ER
2004
Springer
93views Database» more  ER 2004»
14 years 4 months ago
A Pattern and Dependency Based Approach to the Design of Process Models
Abstract. In this paper an approach for building process models for ecommerce is proposed. It is based on the assumption that the process modeling task can be methodologically supp...
Maria Bergholtz, Prasad Jayaweera, Paul Johannesso...
IEEEARES
2006
IEEE
14 years 5 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
WECWIS
2009
IEEE
168views ECommerce» more  WECWIS 2009»
14 years 5 months ago
SARI-SQL: Event Query Language for Event Analysis
Complex Event Processing (CEP) systems are capable of processing large amounts of events, utilizing them to monitor, steer and optimize business in real time. The lack of tracking...
Szabolcs Rozsnyai, Josef Schiefer, Heinz Roth