Sciweavers

49 search results - page 3 / 10
» Pseudonym Systems
Sort
View
SPW
2004
Springer
13 years 11 months ago
Pseudonymity in the Light of Evidence-Based Trust
This position paper discusses the relation of privacy, namely pseudonymity, to evidence-based trust (or rather reputation). Critical concepts of evidence-based trust/reputation sys...
Daniel Cvrcek, Václav Matyás Jr.
SACRYPT
1999
Springer
13 years 10 months ago
Pseudonym Systems
Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, St...
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
14 years 17 days ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...
JSW
2008
240views more  JSW 2008»
13 years 6 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
DIAU
2000
Springer
13 years 10 months ago
On Pseudonymization of Audit Data for Intrusion Detection
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Joachim Biskup, Ulrich Flegel