Sciweavers

IJCAI
2007
14 years 8 days ago
Privacy and Artificial Agents, or, Is Google Reading My Email?
We investigate legal and philosophical notions of privacy in the context of artificial agents. Our analysis utilizes a normative account of privacy that defends its value and the ...
Samir Chopra, Laurence White
ISSA
2008
14 years 8 days ago
The Principle of Security Safeguards: Accidental Activities
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Rasika Dayarathna
HCI
2007
14 years 8 days ago
Privacy Requirements in Identity Management Solutions
In this paper we highlight the need for privacy of user data used in digital identity management systems. We investigate the issues from the individual, business, and government pe...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
DBSEC
2008
115views Database» more  DBSEC 2008»
14 years 9 days ago
P4A: A New Privacy Model for XML
Abstract. We propose a new privacy model for XML data called Privacy for All (P4A) to capture collectors privacy practice and data providers privacy preferences. Through P4A data c...
Angela Cristina Duta, Ken Barker
CSREASAM
2008
14 years 9 days ago
On Providing Automatic Parental Consent over Information Collection from Children
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...
COMAD
2008
14 years 9 days ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
BIOSIG
2007
170views Biometrics» more  BIOSIG 2007»
14 years 9 days ago
Privacy enhancing technology for a 3D-face recognition system
: 2D Face images are traditionally used in civil governmental applications. An extension from 2D to 3D images will lead to several advantages when setting up automated authenticati...
Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, ...
ACSW
2007
14 years 9 days ago
The motivation and proposition of a privacy-enhancing architecture for operational databases
To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such...
Kirsten Wahlstrom, Gerald Quirchmayr
ACSW
2007
14 years 9 days ago
Controlling Inference: Avoiding P-level Reduction during Analysis
This paper presents a concept hierarchy-based approach to privacy preserving data collection for data mining called the P-level model. The P-level model allows data providers to d...
Adepele Williams, Ken Barker
EUC
2008
Springer
14 years 18 days ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...