Sciweavers

1040 search results - page 43 / 208
» Privacy for Telecom Services
Sort
View
CIDR
2007
79views Algorithms» more  CIDR 2007»
13 years 10 months ago
Beyond Just Data Privacy
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
Bob Mungamuru, Hector Garcia-Molina
CIKM
2010
Springer
13 years 8 months ago
Preserving location and absence privacy in geo-social networks
Online social networks often involve very large numbers of users who share very large volumes of content. This content is increasingly being tagged with geo-spatial and temporal c...
Dario Freni, Carmen Ruiz Vicente, Sergio Mascetti,...
ACMSE
2005
ACM
14 years 2 months ago
Token-based dynamic trust establishment for web services
Despite recent advances in trust relationship control mechanisms, issues remain that impede the development of effective trust models. One of these is the lack of dynamic mechanis...
Zhengping Wu, Alfred C. Weaver
CAISE
2003
Springer
14 years 2 months ago
Towards a Component based Privacy Protector Architecture
The development of mobile communication technology and ubiquitous computing paradigm and the emergence of m-healthcare, m-business and m-education services have raised the urgency ...
Amr Ali Eldin, René W. Wagenaar
SOUPS
2009
ACM
14 years 3 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov