Sciweavers

36 search results - page 3 / 8
» Privacy preserving electronic surveillance
Sort
View
CCS
2005
ACM
13 years 11 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
ISPEC
2007
Springer
13 years 12 months ago
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do no...
Yanjiang Yang, Robert H. Deng, Feng Bao
TIS
1998
62views more  TIS 1998»
13 years 5 months ago
An Ethics For The New Surveillance
The Principles of Fair Information Practice are almost three decades old and need to be broadened to take account of new technologies for collecting personal information such as d...
Gary T. Marx
ICEBE
2006
IEEE
115views Business» more  ICEBE 2006»
13 years 12 months ago
From Commodity to Value: A Privacy-Preserving e-Business Architecture
Privacy has been recognized as a very important issue in electronic commerce. However, many privacy techniques were not adopted and many online anonymity services failed. In this ...
Yitao Duan, John F. Canny
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
13 years 11 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...