Sciweavers

344 search results - page 9 / 69
» Process Modeling as a Basis for Auditing Information Privacy
Sort
View
FC
2009
Springer
150views Cryptology» more  FC 2009»
14 years 3 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
CHI
2005
ACM
14 years 9 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
ACSAC
1999
IEEE
14 years 1 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
CAISE
2006
Springer
14 years 17 days ago
Supporting Planned and Ad-Hoc Changes of Business Processes
Flexibility of business processes requires a modeling language that can distinguish between the stable and flexible parts of a business process. Starting from a general model of bu...
Peter Rittgen
OOPSLA
2007
Springer
14 years 3 months ago
A proposal for taming uncertainty in the collaborative conceptual model development process
There have been various proposals for the formalization of appropriate viewpoint-based frameworks. The model that we intend to devise attempts to provide a basis for conceptual mo...
Ebrahim Bagheri