Sciweavers

841 search results - page 104 / 169
» RFIDs and Personal Privacy
Sort
View
JCS
2008
88views more  JCS 2008»
13 years 10 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
JUCS
2006
102views more  JUCS 2006»
13 years 10 months ago
A Mechanism for Solving Conflicts in Ambient Intelligent Environments
: Ambient Intelligence scenarios describe situations in which multitude of devices and agents live together. In this kind ofscenarios is frequent to see the appearance ofconflicts ...
Pablo A. Haya, Germán Montoro, Abraham Esqu...
TRUSTBUS
2010
Springer
13 years 8 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall
INFOCOM
2012
IEEE
12 years 16 days ago
Fine-grained private matching for proximity-based mobile social networking
—Proximity-based mobile social networking (PMSN) refers to the social interaction among physically proximate mobile users directly through the Bluetooth/WiFi interfaces on their ...
Rui Zhang 0007, Yanchao Zhang, Jinyuan Sun, Guanhu...
CCS
2011
ACM
12 years 10 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...