Sciweavers

343 search results - page 31 / 69
» The All-In Publication Policy
Sort
View
ESORICS
2009
Springer
14 years 2 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
CCS
2006
ACM
14 years 2 months ago
Data collection with self-enforcing privacy
Consider a pollster who wishes to collect private, sensitive data from a number of distrustful individuals. How might the pollster convince the respondents that it is trustworthy?...
Philippe Golle, Frank McSherry, Ilya Mironov
EUROPKI
2006
Springer
14 years 2 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
COMMA
2008
14 years 12 days ago
Political Engagement Through Tools for Argumentation
In this paper we discuss the development of tools to support a system for edemocracy that is based upon and makes use of existing theories of argument representation and evaluatio...
Dan Cartwright, Katie Atkinson
DGO
2009
111views Education» more  DGO 2009»
14 years 1 days ago
"Integrated" and "transcendent" e-government: keys for analyzing organizational structure and governance
As e-government enters the "transformation" phase, public authorities face major challenges in terms of governance and leadership. The present article consolidates prior...
Beat Estermann, Reinhard Riedl, Alessia C. Neuroni