Sciweavers

3272 search results - page 434 / 655
» Privacy in Data Publishing
Sort
View
MIE
2008
125views Healthcare» more  MIE 2008»
15 years 6 months ago
Knowledge Management for the Protection of Information in Electronic Medical Records
: This paper describes foundational work investigating the protection requirements of sensitive medical information, which is being stored more routinely in repository systems for ...
Nathan Lea, Stephen Hailes, Tony Austin, Dipak Kal...
IFIP11
2004
141views Business» more  IFIP11 2004»
15 years 6 months ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze
CRITIS
2009
15 years 5 months ago
Energy Theft in the Advanced Metering Infrastructure
Abstract. Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an adva...
Stephen E. McLaughlin, Dmitry Podkuiko, Patrick Mc...
HUC
2010
Springer
15 years 5 months ago
Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing
The popularity of micro-blogging has made generalpurpose information sharing a pervasive phenomenon. This trend is now impacting location sharing applications (LSAs) such that use...
Karen P. Tang, Jialiu Lin, Jason I. Hong, Daniel P...
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
15 years 5 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro