Sciweavers

841 search results - page 100 / 169
» RFIDs and Personal Privacy
Sort
View
EUROSSC
2006
Springer
14 years 1 months ago
Towards Hovering Information
This paper introduces a new concept of information that can exist in a mobile environment with no fixed infrastructure and centralized servers, which we call the Hovering Informati...
Alfredo A. Villalba Castro, Dimitri Konstantas
PERCOM
2006
ACM
14 years 9 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
ASUNAM
2009
IEEE
14 years 4 months ago
Prying Data out of a Social Network
—Preventing adversaries from compiling significant amounts of user data is a major challenge for social network operators. We examine the difficulty of collecting profile and ...
Joseph Bonneau, Jonathan Anderson, George Danezis
SDMW
2009
Springer
14 years 4 months ago
An Access Control Language for a General Provenance Model
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
IEEEARES
2007
IEEE
14 years 4 months ago
CASSIS - Computer-based Academy for Security and Safety in Information Systems
Information technologies and society are highly interwoven nowadays, but in both, the private and business sector, users are often not aware of security issues or lack proper secu...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...