Sciweavers

15379 search results - page 322 / 3076
» Protecting users from
Sort
View
151
Voted
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
15 years 7 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
141
Voted
IJCAI
2007
15 years 5 months ago
Privacy and Artificial Agents, or, Is Google Reading My Email?
We investigate legal and philosophical notions of privacy in the context of artificial agents. Our analysis utilizes a normative account of privacy that defends its value and the ...
Samir Chopra, Laurence White
121
Voted
INFSOF
2006
81views more  INFSOF 2006»
15 years 3 months ago
A framework for anonymous but accountable self-organizing communities
In this paper we propose a novel architecture and approach to provide accountability for Web communities that require a high-level of privacy. A two-layered privacy protection arc...
Gábor Ziegler, Csilla Farkas, András...
143
Voted
GIS
2009
ACM
15 years 1 months ago
Distortion-based anonymity for continuous queries in location-based mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. Various location cloaking approaches have been proposed to protect the locati...
Xiao Pan, Xiaofeng Meng, Jianliang Xu
137
Voted
CHI
2002
ACM
16 years 4 months ago
Out of many, one: reliable results from unreliable recognition
Recognition technologies such as speech recognition and optical recognition are still, by themselves. not reliable enough for many practical uses in user interfaces However, by co...
Henry Lieberman