Sciweavers

240 search results - page 8 / 48
» Privacy and Utility in Business Processes
Sort
View
DBSEC
2006
107views Database» more  DBSEC 2006»
14 years 8 days ago
From Business Process Choreography to Authorization Policies
Abstract. A choreography specifies the interactions between the resources of multiple collaborating parties at design time. The runtime management of authorization policies in orde...
Philip Robinson, Florian Kerschbaum, Andreas Schaa...
BIS
2008
119views Business» more  BIS 2008»
14 years 10 days ago
Influence Factors of Understanding Business Process Models
The increasing utilization of business process models both in business analysis and information systems development raises several issues regarding quality measures. In this contex...
Jan Mendling, Mark Strembeck
WCE
2007
14 years 1 days ago
Performing Early Feasibility Studies of Software Development Projects Using Business Process Models
—A new approach to perform feasibility studies using business process models is proposed. The utilization of the improved Role Activity Diagram notations has led to the extractio...
Ayman Issa, Faisal A. Abu Rub
EDBT
2012
ACM
225views Database» more  EDBT 2012»
12 years 1 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
14 years 5 months ago
Privacy Protected Query Processing on Spatial Networks
With the proliferation of mobile devices (e.g., PDAs, cell phones, etc.), location-based services have become more and more popular in recent years. However, users have to reveal ...
Wei-Shinn Ku, Roger Zimmermann, Wen-Chih Peng, Sus...