Sciweavers

1040 search results - page 11 / 208
» Privacy for Telecom Services
Sort
View
BPM
2006
Springer
117views Business» more  BPM 2006»
13 years 11 months ago
Web Service E-Contract Establishment Using Features
Electronic contracts describe inter-organizational business processes in terms of supply and consumption of electronic services (commonly Web services). In a given contract domain,...
Marcelo Fantinato, Itana Maria de Souza Gimenes, M...
PET
2007
Springer
14 years 1 months ago
Louis, Lester and Pierre: Three Protocols for Location Privacy
Abstract. Location privacy is of utmost concern for location-based services. It is the property that a person’s location is revealed to other entities, such as a service provider...
Ge Zhong, Ian Goldberg, Urs Hengartner
DEXAW
2002
IEEE
112views Database» more  DEXAW 2002»
14 years 18 days ago
Privacy-Enabled Services for Enterprises
The IBM Enterprise Privacy Architecture (EPA) is a methodology for enterprises to provide an enhanced and well-defined level of privacy to their customers. EPA is structured in f...
Günter Karjoth, Matthias Schunter, Michael Wa...
TMC
2012
11 years 10 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
PERCOM
2010
ACM
13 years 6 months ago
Privacy Butler: A personal privacy rights manager for online presence
Abstract—The online presence projected by a person is comprised of all the information about them available on the Internet. In online communities and social networking services,...
Ryan Wishart, Domenico Corapi, Anil Madhavapeddy, ...