Sciweavers

1040 search results - page 33 / 208
» Privacy for Telecom Services
Sort
View
TKDE
2012
215views Formal Methods» more  TKDE 2012»
11 years 11 months ago
Outsourced Similarity Search on Metric Data Assets
—This paper considers a cloud computing setting in which similarity querying of metric data is outsourced to a service provider. The data is to be revealed only to trusted users,...
Man Lung Yiu, Ira Assent, Christian S. Jensen, Pan...
SOUPS
2009
ACM
14 years 3 months ago
The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing
A recent trend in social networking, photo/video sharing, and location-sharing services is a demand for more expressive privacy mechanisms that provide greater control over the co...
Michael Benisch, Patrick Gage Kelley, Norman M. Sa...
OTM
2007
Springer
14 years 3 months ago
Spontaneous Privacy Policy Negotiations in Pervasive Environments
Abstract. Privacy issues are a major burden for the acceptance of pervasive applications. They may ultimately result in the rejection of new services despite their functional beneď...
Sören Preibusch
SOCA
2010
IEEE
13 years 7 months ago
Supporting the evolution of model-driven service-oriented systems: A case study on QoS-aware process-driven SOAs
Process-driven service-oriented architectures (SOA) need to cope with constant changing requirements of various compliance requirements, such as quality of service (QoS) constraint...
Ernst Oberortner, Uwe Zdun, Schahram Dustdar, Agni...
ACSW
2007
13 years 10 months ago
Usability and Privacy in Identity Management Architectures
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of ...
Audun Jøsang, Mohammed Al Zomai, Suriadi Su...