Sciweavers

1040 search results - page 55 / 208
» Privacy for Telecom Services
Sort
View
ISPEC
2007
Springer
14 years 3 months ago
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do no...
Yanjiang Yang, Robert H. Deng, Feng Bao
VLDB
2002
ACM
123views Database» more  VLDB 2002»
13 years 8 months ago
Maintaining Data Privacy in Association Rule Mining
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. We investigate here,...
Shariq Rizvi, Jayant R. Haritsa
CSE
2009
IEEE
14 years 4 months ago
Solutions to Security and Privacy Issues in Mobile Social Networking
—Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable of running applicati...
Aaron Beach, Mike Gartrell, Richard Han
ESAW
2006
Springer
14 years 27 days ago
Privacy Management in User-Centred Multi-agent Systems
Abstract. In all user-centred agent-based applications, for instance in the context of ambient computing, the user agent is often faced to a difficult trade-off between the protect...
Guillaume Piolle, Yves Demazeau, Jean Caelen
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
14 years 3 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll