Sciweavers

408 search results - page 19 / 82
» Tailoring Privacy to Users' Needs
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
TRUSTBUS
2009
Springer
14 years 2 months ago
An Anonymous Credit Card System
Abstract. Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to mon...
Elli Androulaki, Steven M. Bellovin
APSCC
2008
IEEE
13 years 10 months ago
Measuring the Effectiveness and the Fairness of Relation Hiding Systems
In this paper, we develop a framework for measuring the level of protection offered by relation hiding systems. The framework provides a uniform way to define a variety of privacy ...
Andreas Pashalidis
SOUPS
2006
ACM
14 years 2 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
ERCIMDL
2004
Springer
137views Education» more  ERCIMDL 2004»
14 years 1 months ago
Managing a Paradigm Shift - Aligning Management, Privacy Policy, Technology and Standards
It is argued that we are experiencing a paradigm shift from a user perspective to a client perspective in library and information science. The paradigm shift is brought about by re...
Jonas Holmström