Sciweavers

841 search results - page 105 / 169
» RFIDs and Personal Privacy
Sort
View
ISI
2003
Springer
14 years 3 months ago
PROGENIE: Biographical Descriptions for Intelligence Analysis
Intelligence analysts face the need for immediate, up-to-date information about individuals of interest. While biographies can be written and stored in text databases, we argue tha...
Pablo Ariel Duboué, Kathleen McKeown, Vasil...
WEBNET
1996
13 years 11 months ago
Modelling alter egos in cyberspace: Who is responsible?
Abstract: Alter Egos represent people in Cyberspace. An Alter Ego is a kind of intelligent agent who is active in performing actions in behalf of the person it represents. How thes...
Reind P. van de Riet, J. F. M. Burg
ICDCS
2011
IEEE
12 years 9 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
ACSC
2009
IEEE
14 years 5 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
SACMAT
2009
ACM
14 years 4 months ago
A semantic web based framework for social network access control
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...