Sciweavers

581 search results - page 94 / 117
» policy 2009
Sort
View
CIKM
2009
Springer
14 years 3 months ago
Online anonymity for personalized web services
To receive personalized web services, the user has to provide personal information and preferences, in addition to the query itself, to the web service. However, detailed personal...
Yabo Xu, Ke Wang, Guoliang Yang, Ada Wai-Chee Fu
CIKM
2009
Springer
14 years 3 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
EMISA
2009
Springer
14 years 3 months ago
Controlled Flexibility and Lifecycle Management of Business Processes through Extensibility
Companies employ business process management suites to model, run, and maintain their processes. These processes are required to comply with requirements originating from standards...
Sören Balko, Arthur H. M. ter Hofstede, Alist...
ESAW
2009
Springer
14 years 3 months ago
A Space-Based Generic Pattern for Self-Initiative Load Balancing Agents
Abstract. Load-Balancing is a significant problem in heterogeneous distributed systems. There exist many load balancing algorithms, however, most approaches are very problem speci...
eva Kühn, Vesna Sesum-Cavic
FC
2009
Springer
109views Cryptology» more  FC 2009»
14 years 3 months ago
Optimised to Fail: Card Readers for Online Banking
Abstract. The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used toge...
Saar Drimer, Steven J. Murdoch, Ross J. Anderson