Sciweavers

IEEEARES
2010
IEEE
13 years 9 months ago
Visualizing Past Personal Data Disclosures
—Today’s rich service offer in the World Wide Web increasingly requires the disclosure of personal user data. Service providers’ appetite for personal user data, however, is ...
Jan Kolter, Michael Netter, Günther Pernul
ELPUB
2004
ACM
13 years 10 months ago
The need for sharing user-profiles in digital libraries
Personalization was a hype in the late 1990s. Several organizations offered (and are still offering) personalization services for their customers. From ecommerce applications we...
Harald Krottmaier
WPES
2005
ACM
13 years 10 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
STORAGESS
2005
ACM
13 years 10 months ago
Pvault: a client server system providing mobile access to personal data
In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The maj...
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalin...
MIDDLEWARE
2007
Springer
13 years 10 months ago
Middleware support for protecting personal data from web based data services
Web based data services are very popular with the average computer user. Examples of such services include Gmail.com, Yahoo Photos, Yahoo Briefcase and Amazon S3 Service. In such ...
Ravi Chandra Jammalamadaka
CDVE
2007
Springer
165views Visualization» more  CDVE 2007»
13 years 10 months ago
Private Data Management in Collaborative Environments
Organizations are under increasing pressures to manage all of the personal data concerning their customers and employees in a responsible manner. With the advancement of informatio...
Larry Korba, Ronggong Song, George Yee, Andrew S. ...
WISE
2007
Springer
13 years 10 months ago
Privacy Inspection and Monitoring Framework for Automated Business Processes
More and more personal data is exposed to automatic and programmatic access, making it more difficult to safeguard the personal information from unauthorised access at every step. ...
Yin Hua Li, Hye-Young Paik, Jun Chen
IEEEARES
2007
IEEE
13 years 10 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
IAT
2007
IEEE
13 years 10 months ago
A Design of Client Side Information Management Method for Web Services Collaboration
In this paper, we propose a client side information management method for web services collaboration. Recently, personalization is one of the most challenging topics of the web te...
Hajime Hotta, Takashi Nozawa, Masafumi Hagiwara
IEEEARES
2008
IEEE
13 years 11 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...