Sciweavers

320 search results - page 7 / 64
» Securing history: Privacy and accountability in database sys...
Sort
View
DIM
2007
ACM
13 years 11 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
PERVASIVE
2006
Springer
13 years 7 months ago
The Smart Tachograph - Individual Accounting of Traffic Costs and Its Implications
Today, several costs caused by road traffic may either be only roughly approximated, or cannot be clearly assigned to the drivers causing them, or both. They are typically distribu...
Vlad Coroama
ICASSP
2011
IEEE
12 years 11 months ago
User verification: Matching the uploaders of videos across accounts
This article presents an attempt to link the uploaders of videos based on the audio track of the videos. Using a subset of the MediaEval [10] Placing Task’s Flickr video set, wh...
Howard Lei, Jaeyoung Choi, Adam Janin, Gerald Frie...
ICDE
2008
IEEE
131views Database» more  ICDE 2008»
14 years 2 months ago
PLUS: Synthesizing privacy, lineage, uncertainty and security
— Privacy, lineage, uncertainty, and security are important to many information integration efforts, and these “PLUS” properties interact in a number of complex ways. This pa...
Barbara T. Blaustein, Len Seligman, Michael Morse,...
TSE
2008
128views more  TSE 2008»
13 years 7 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón