Sciweavers

201 search results - page 10 / 41
» A Utility-Theoretic Approach to Privacy and Personalization
Sort
View
IDTRUST
2009
ACM
15 years 6 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
EUPROJECTS
2006
Springer
15 years 3 months ago
User Interfaces for Persons with Deafblindness
This paper examines problems persons with deafblindness have when using computers and it analyses how we can approach these problems in the redesign of a communication tool. A qual...
Sara Rutgersson, Mattias Arvola
ISI
2006
Springer
14 years 11 months ago
Inferring Privacy Information from Social Networks
Since privacy information can be inferred via social relations, the privacy confidentiality problem becomes increasingly challenging as online social network services are more popu...
Jianming He, Wesley W. Chu, Zhenyu Liu
ATAL
2007
Springer
15 years 5 months ago
An agent-based approach for privacy-preserving recommender systems
Recommender Systems are used in various domains to generate personalized information based on personal user data. The ability to preserve the privacy of all participants is an ess...
Richard Cissée, Sahin Albayrak
DKE
2002
130views more  DKE 2002»
14 years 11 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber