Sciweavers

415 search results - page 2 / 83
» Using Privacy Process Patterns for Incorporating Privacy Req...
Sort
View
ICDE
2006
IEEE
275views Database» more  ICDE 2006»
14 years 7 months ago
Privacy Preserving Query Processing Using Third Parties
Data integration from multiple autonomous data sources has emerged as an important practical problem. The key requirement for such data integration is that owners of such data nee...
Amr El Abbadi, Aziz Gulbeden, Divyakant Agrawal, F...
TRUSTBUS
2010
Springer
13 years 4 months ago
Context-Aware Privacy Design Pattern Selection
:  Context-Aware Privacy Design Pattern Selection Siani Pearson, Yun Shen HP Laboratories HPL-2010-74 Privacy, Design Patterns, Context Awareness User-related contextual factors...
Siani Pearson, Yun Shen
REFSQ
2010
Springer
13 years 7 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...
ICIP
2003
IEEE
14 years 7 months ago
Incorporating constraints into the design of locally identifiable calibration patterns
Camera calibration requires the identification of points in an image that correspond to known locations in the scene. These are typically determined through the use of a calibrati...
Anton van den Hengel, Rhys Hill, Michael J. Brooks
IEEEARES
2008
IEEE
14 years 1 days ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...