Sciweavers

2272 search results - page 432 / 455
» Provable Data Privacy
Sort
View
SACMAT
2010
ACM
14 years 21 days ago
A card requirements language enabling privacy-preserving access control
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online...
Jan Camenisch, Sebastian Mödersheim, Gregory ...
COLCOM
2009
IEEE
14 years 17 days ago
Toward synchronization between decentralized orchestrations of composite web services
—Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation poin...
Walid Fdhila, Claude Godart
SIGECOM
2000
ACM
116views ECommerce» more  SIGECOM 2000»
14 years 7 days ago
Privacy-preserving global customization
d Abstract) Robert M. Arlein Ben Jai Markus Jakobsson Fabian Monrose Michael K. Reiter Information Sciences Research Center Bell Labs, Lucent Technologies Murray Hill, NJ, USA We ...
Robert M. Arlein, Ben Jai, Markus Jakobsson, Fabia...
DEXAW
1999
IEEE
105views Database» more  DEXAW 1999»
14 years 5 days ago
Personalizing the Web Using Site Descriptions
The information overload on the Web has created a great need for efficient filtering mechanisms. Many sites (e.g., CNN and Quicken) address this problem by allowing a user to crea...
Vinod Anupam, Yuri Breitbart, Juliana Freire, Bhar...
CHIMIT
2007
ACM
13 years 12 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson