Sciweavers

8701 search results - page 77 / 1741
» Protecting information on the Web
Sort
View
ANOR
2011
175views more  ANOR 2011»
13 years 6 months ago
Integrated exact, hybrid and metaheuristic learning methods for confidentiality protection
A vital task facing government agencies and commercial organizations that report data is to represent the data in a meaningful way and simultaneously to protect the confidentialit...
Fred Glover, Lawrence H. Cox, Rahul Patil, James P...
ICSE
2007
IEEE-ACM
14 years 11 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
TMC
2008
159views more  TMC 2008»
13 years 9 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
ISSA
2008
14 years 18 days ago
The IP Protection of Electronic Databases: Copyright or Copywrong?
The protection of the intellectual investments embodied in databases is of the utmost importance. Technological innovation has rendered databases vulnerable to unauthorised access...
Tana Pistorius
COLCOM
2008
IEEE
14 years 5 months ago
Combining Social Networks and Semantic Web Technologies for Personalizing Web Access
Abstract. The original purpose of Web metadata was to protect endusers from possible harmful content and to simplify search and retrieval. However they can also be exploited in mor...
Barbara Carminati, Elena Ferrari, Andrea Perego