Sciweavers

81 search results - page 3 / 17
» Controlling information release in the pi-calculus
Sort
View
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
SIS
2008
13 years 6 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
EOR
2006
86views more  EOR 2006»
13 years 4 months ago
Minimum-distance controlled perturbation methods for large-scale tabular data protection
National Statistical Agencies routinely release large amounts of tabular information. Prior to dissemination, tabular data needs to be processed to avoid the disclosure of individ...
Jordi Castro
ICDE
2005
IEEE
109views Database» more  ICDE 2005»
13 years 10 months ago
Advanced Metadata for Privacy-Aware Representation of Credentials
Semantic Web languages like OWL and RDFS promise to be viable means for representing metadata describing users and resources available over the Internet. Recently, interest has be...
Paolo Ceravolo, Ernesto Damiani, Sabrina De Capita...
CSFW
2003
IEEE
13 years 10 months ago
Using Access Control for Secure Information Flow in a Java-like Language
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...
Anindya Banerjee, David A. Naumann