Sciweavers

184 search results - page 36 / 37
» A TMDM Disclosure Using T
Sort
View
CCS
2001
ACM
13 years 10 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
SIGMOD
2005
ACM
127views Database» more  SIGMOD 2005»
14 years 5 months ago
Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records
As critical records are increasingly stored in electronic form, which tends to make for easy destruction and clandestine modification, it is imperative that they be properly manag...
Qingbo Zhu, Windsor W. Hsu
SOUPS
2009
ACM
14 years 3 days ago
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social net...
Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes D...
ACSAC
1999
IEEE
13 years 10 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
PODS
2007
ACM
122views Database» more  PODS 2007»
14 years 5 months ago
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
The contingency table is a work horse of official statistics, the format of reported data for the US Census, Bureau of Labor Statistics, and the Internal Revenue Service. In many ...
Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Sat...