Sciweavers

68 search results - page 3 / 14
» The challenge of data and application security and privacy (...
Sort
View
SBBD
2003
135views Database» more  SBBD 2003»
13 years 6 months ago
Privacy Preserving Clustering by Data Transformation
Despite its benefit in a wide range of applications, data mining techniques also have raised a number of ethical issues. Some such issues include those of privacy, data security,...
Stanley R. M. Oliveira, Osmar R. Zaïane
MOBISYS
2007
ACM
14 years 4 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
13 years 9 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
TDP
2010
140views more  TDP 2010»
13 years 1 days ago
Movement Data Anonymity through Generalization
In recent years, spatio-temporal and moving objects databases have gained considerable interest, due to the diffusion of mobile devices (e.g., mobile phones, RFID devices and GPS ...
Anna Monreale, Gennady L. Andrienko, Natalia V. An...
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
13 years 9 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...