Sciweavers

841 search results - page 97 / 169
» RFIDs and Personal Privacy
Sort
View
TIS
1998
62views more  TIS 1998»
13 years 9 months ago
An Ethics For The New Surveillance
The Principles of Fair Information Practice are almost three decades old and need to be broadened to take account of new technologies for collecting personal information such as d...
Gary T. Marx
IEEEARES
2007
IEEE
14 years 4 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
ISSA
2004
13 years 11 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford
CCS
2011
ACM
12 years 10 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
AGENTS
1997
Springer
14 years 2 months ago
A Methodology for Building Believable Social Agents
Believable agents are defined to be interactive versions of quality characters in traditional artistic media like film. Such agents are useful in applications such as interactive ...
W. Scott Neal Reilly