Sciweavers

841 search results - page 74 / 169
» RFIDs and Personal Privacy
Sort
View
SICHERHEIT
2010
13 years 6 months ago
Amun: Automatic Capturing of Malicious Software
: This paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the ...
Jan Göbel
DEXAW
1999
IEEE
105views Database» more  DEXAW 1999»
14 years 1 months ago
Personalizing the Web Using Site Descriptions
The information overload on the Web has created a great need for efficient filtering mechanisms. Many sites (e.g., CNN and Quicken) address this problem by allowing a user to crea...
Vinod Anupam, Yuri Breitbart, Juliana Freire, Bhar...
DRM
2003
Springer
14 years 2 months ago
How DRM-based content delivery systems disrupt expectations of "personal use"
We set out to examine whether current, DRM-based online offerings of music and movies accord with consumers’ current expectations regarding the personal use of copyrighted works...
Deirdre K. Mulligan, John Han, Aaron J. Burstein
SIGMOD
2010
ACM
436views Database» more  SIGMOD 2010»
13 years 9 months ago
Pluggable personal data servers
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...
CCR
2010
169views more  CCR 2010»
13 years 9 months ago
On the leakage of personally identifiable information via online social networks
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity ...
Balachander Krishnamurthy, Craig E. Wills