Sciweavers

841 search results - page 51 / 169
» RFIDs and Personal Privacy
Sort
View
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
EDBT
2004
ACM
234views Database» more  EDBT 2004»
14 years 9 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu
CAISE
2007
Springer
14 years 3 months ago
Conceptual Modeling of Privacy-Aware Web Service Protocols
Abstract. Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stor...
Rachid Hamadi, Hye-Young Paik, Boualem Benatallah
BCSHCI
2008
13 years 10 months ago
Strategies and struggles with privacy in an online social networking community
Online social networking communities such as Facebook and MySpace are extremely popular. These sites have changed how many people develop and maintain relationships through postin...
Katherine Strater, Heather Richter Lipford
IJCAI
2003
13 years 10 months ago
A Semantic-Based User Privacy Protection Framework for Web Services
Abstract. Web service technology is an Internet-based distributed computing paradigm to address interoperability in heterogeneous distributed systems. In this paper, we present a p...
Arif Tumer, Asuman Dogac, Ismail Hakki Toroslu