Sciweavers

IFIP11
2004
110views Business» more  IFIP11 2004»
13 years 7 months ago
A Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [1] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. Th...
Andreas Pashalidis, Chris J. Mitchell
IFIP11
2004
102views Business» more  IFIP11 2004»
13 years 7 months ago
Privacy Invasive Software in File-Sharing Tools
Andreas Jacobsson, Martin Boldt, Bengt Carlsson
IFIP11
2004
109views Business» more  IFIP11 2004»
13 years 7 months ago
Taxonomy of Mixes and Dummy Traffic
This paper presents an analysis of mixes and dummy traffic policies, which are building blocks of anonymous services. The goal of the paper is to bring together all the issues rela...
Claudia Díaz, Bart Preneel
IFIP11
2004
114views Business» more  IFIP11 2004»
13 years 7 months ago
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications
: Software fixes, patches and updates are issued periodically to extend the functional life cycle of software products. In order to facilitate the prompt notification, delivery, an...
Andrew M. Colarik, Clark D. Thomborson, Lech J. Ja...
IFIP11
2004
122views Business» more  IFIP11 2004»
13 years 7 months ago
Infusing Privacy Norms in DRM - Incentives and Perspectives from Law
: This paper outlines some basic characteristics of digital rights management (DRM) systems, as well as the ways that DRM systems can threaten user privacy. The author asserts that...
Alex Cameron
IFIP11
2004
141views Business» more  IFIP11 2004»
13 years 7 months ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze
ICWS
2004
IEEE
13 years 7 months ago
Business Services Networks
The fundamental challenge of e-commerce is enabling companies to do business with one another across a network, despite different business processes and computer systems. Traditio...
Jay M. Tenenbaum
ICEB
2004
175views Business» more  ICEB 2004»
13 years 7 months ago
Privacy-Preserving Collaborative Association Rule Mining
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among parties i...
Justin Z. Zhan, Stan Matwin, Nathalie Japkowicz, L...
ICEB
2004
175views Business» more  ICEB 2004»
13 years 7 months ago
Privacy-Preserving Data Mining in Electronic Surveys
Electronic surveys are an important resource in data mining. However, how to protect respondents' data privacy during the survey is a challenge to the security and privacy co...
Justin Z. Zhan, Stan Matwin
ICEB
2004
242views Business» more  ICEB 2004»
13 years 7 months ago
PATSEEK: Content Based Image Retrieval System for Patent Database
A patent always contains some images along with the text. Many text based systems have been developed to search the patent database. In this paper, we describe PATSEEK that is an ...
Avinash Tiwari, Veena Bansal