Sciweavers

15379 search results - page 50 / 3076
» Protecting users from
Sort
View
DBSEC
2007
151views Database» more  DBSEC 2007»
13 years 9 months ago
Location Privacy Protection Through Obfuscation-Based Techniques
The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications th...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
PET
2010
Springer
13 years 11 months ago
Private Information Disclosure from Web Searches
As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and ...
Claude Castelluccia, Emiliano De Cristofaro, Danie...
IADIS
2003
13 years 9 months ago
A Framework of High Confidence E-Healthcare Information System
In this paper a framework for a high-confidence e-healthcare information system which meets five criteria including availability, reliability, security, survivability and restorab...
Shun-Chieh Lin, Wen-Hsiang Tsai, Shian-Shyong Tsen...
DBSEC
2006
86views Database» more  DBSEC 2006»
13 years 9 months ago
Enhancing User Privacy Through Data Handling Policies
The protection of privacy is an increasing concern in today's global infrastructure. One of the most important privacy protection principles states that personal information c...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
DASFAA
2007
IEEE
195views Database» more  DASFAA 2007»
14 years 2 months ago
Quality Aware Privacy Protection for Location-Based Services
Protection of users’ privacy has been a central issue for location-based services (LBSs). In this paper, we classify two kinds of privacy protection requirements in LBS: location...
Zhen Xiao, Xiaofeng Meng, Jianliang Xu