Sciweavers

SAJ
2002
97views more  SAJ 2002»
13 years 4 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
CACM
1999
108views more  CACM 1999»
13 years 4 months ago
Privacy Interfaces for Information Management
To facilitate the sharing of information using modern communication networks, users must be able to decide on a privacy policy--what information to conceal, what to reveal, and to...
Tessa A. Lau, Oren Etzioni, Daniel S. Weld
CORR
2000
Springer
83views Education» more  CORR 2000»
13 years 4 months ago
Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices
A variety of tools have been introduced recently that are designed to help people protect their privacy on the Internet. These tools perform many different functions including enc...
Lorrie Faith Cranor
TWC
2008
143views more  TWC 2008»
13 years 4 months ago
Mobile Privacy in Wireless Networks-Revisited
Abstract-- With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protectin...
Caimu Tang, Dapeng Oliver Wu
JLBS
2007
75views more  JLBS 2007»
13 years 4 months ago
Designing privacy-aware mobility pricing systems based on user perspective
Mobility-pricing is one of the avenues leading to the information highway. Using a combination of positioning, communication and information processing, automobile insurance can b...
Muhammad Usman Iqbal, Samsung Lim
JCM
2007
143views more  JCM 2007»
13 years 5 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
TDP
2008
160views more  TDP 2008»
13 years 5 months ago
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
Publishing data for analysis from a micro data table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-ano...
Xiaoxun Sun, Hua Wang, Jiuyong Li, Traian Marius T...
TDP
2008
96views more  TDP 2008»
13 years 5 months ago
Constrained Microaggregation: Adding Constraints for Data Editing
Privacy preserving data mining and statistical disclosure control have introduced several methods for data perturbation that can be used for ensuring the privacy of data respondent...
Vicenç Torra
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 5 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
IJMMS
2007
75views more  IJMMS 2007»
13 years 5 months ago
Internet users' perceptions of 'privacy concerns' and 'privacy actions'
A consistent finding reported in online privacy research is that an overwhelming majority of people are ‘concerned’ about their privacy when they use the Internet. Therefore,...
Carina Paine, Ulf-Dietrich Reips, Stefan Stieger, ...