Sciweavers

408 search results - page 11 / 82
» Tailoring Privacy to Users' Needs
Sort
View
BEHAVIOURIT
2011
13 years 3 months ago
Identity crisis: user perspectives on multiplicity and control in federated identity management
The research presented in this paper reports on three phases of an empirical user study that examines the relationship between identity and technology using contextual interviews,...
Christine Satchell, Graeme G. Shanks, Steve Howard...
HCI
2007
13 years 9 months ago
Privacy Requirements in Identity Management Solutions
In this paper we highlight the need for privacy of user data used in digital identity management systems. We investigate the issues from the individual, business, and government pe...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
CCS
2008
ACM
13 years 10 months ago
Controlled privacy preserving keyword search
Data sharing on public servers has become a popular service on the Internet, in which users can store and share data with other users through public servers. However, because the ...
Stephen S. Yau, Yin Yin
CSE
2009
IEEE
14 years 1 days ago
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a use...
Qin Liu, Guojun Wang, Jie Wu
CSI
2008
113views more  CSI 2008»
13 years 8 months ago
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
VANETs have the potential to dramatically increase road safety by giving drivers more time to react adequately to dangerous situations. To prevent abuse of VANETs, a security infra...
Klaus Plößl, Hannes Federrath