Sciweavers

474 search results - page 91 / 95
» Privacy suites: shared privacy for social networks
Sort
View
CORR
2012
Springer
227views Education» more  CORR 2012»
12 years 3 months ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 1 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
FC
2009
Springer
112views Cryptology» more  FC 2009»
14 years 1 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
SOCA
2007
IEEE
14 years 1 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
ITCC
2005
IEEE
14 years 29 days ago
Semantic Grid - Interoperability Solution for Construction VO?
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows colla...
Ziga Turk, Matevz Dolenc, Vlado Stankovski, Etiel ...