Sciweavers

408 search results - page 9 / 82
» Tailoring Privacy to Users' Needs
Sort
View
STOC
2009
ACM
167views Algorithms» more  STOC 2009»
14 years 8 months ago
Universally utility-maximizing privacy mechanisms
A mechanism for releasing information about a statistical database with sensitive data must resolve a trade-off between utility and privacy. Publishing fully accurate information ...
Arpita Ghosh, Tim Roughgarden, Mukund Sundararajan
IADIS
2004
13 years 9 months ago
Authorization of User Profile Access in Identity Management
Distributed management of user profiles and identities allow reuse of profile information for different personalization services but also raises privacy issues. Users need a possi...
Wolfgang Woerndl
ISEUD
2009
Springer
14 years 2 months ago
End-User Development of Enterprise Widgets
Companies are operating in a dynamic environment, resulting in a continuous need of adapting used information systems to changing business processes and associated information need...
Michael Spahn, Volker Wulf
RULEML
2007
Springer
14 years 2 months ago
Exploiting E-C-A Rules for Defining and Processing Context-Aware Push Messages
The focus of this paper is to show that the E-C-A paradigm offers an excellent approach for specifying the behavior of context-aware information push services. Such a service enabl...
Thomas Beer, Jörg Rasinger, Wolfram Höpk...
ICSNC
2006
IEEE
14 years 2 months ago
Privacy-Invasive Software and Preventive Mechanisms
Computers are increasingly more integrated into peoples’ daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometime...
Martin Boldt, Bengt Carlsson