Sciweavers

478 search results - page 12 / 96
» Privacy and pricing personal information
Sort
View
WWW
2006
ACM
14 years 10 months ago
Examining the content and privacy of web browsing incidental information
This research examines the privacy comfort levels of participants if others can view traces of their web browsing activity. During a week-long field study, participants used an el...
Kirstie Hawkey, Kori M. Inkpen
CADE
2005
Springer
14 years 10 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
CAISE
2003
Springer
14 years 2 months ago
Towards a Component based Privacy Protector Architecture
The development of mobile communication technology and ubiquitous computing paradigm and the emergence of m-healthcare, m-business and m-education services have raised the urgency ...
Amr Ali Eldin, René W. Wagenaar
CSFW
2006
IEEE
14 years 3 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
VLDB
2007
ACM
96views Database» more  VLDB 2007»
14 years 3 months ago
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge
Privacy is an important issue in data publishing. Many organizations distribute non-aggregate personal data for research, and they must take steps to ensure that an adversary cann...
Bee-Chung Chen, Raghu Ramakrishnan, Kristen LeFevr...