Sciweavers

841 search results - page 97 / 169
» RFIDs and Personal Privacy
Sort
View
71
Voted
TIS
1998
62views more  TIS 1998»
15 years 3 months ago
An Ethics For The New Surveillance
The Principles of Fair Information Practice are almost three decades old and need to be broadened to take account of new technologies for collecting personal information such as d...
Gary T. Marx
134
Voted
IEEEARES
2007
IEEE
15 years 10 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
135
Voted
ISSA
2004
15 years 5 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford
147
Voted
CCS
2011
ACM
14 years 3 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
131
Voted
AGENTS
1997
Springer
15 years 7 months ago
A Methodology for Building Believable Social Agents
Believable agents are defined to be interactive versions of quality characters in traditional artistic media like film. Such agents are useful in applications such as interactive ...
W. Scott Neal Reilly