Sciweavers

2001 search results - page 15 / 401
» A security architecture for data privacy and security
Sort
View
TRUST
2009
Springer
15 years 6 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
PET
2005
Springer
15 years 5 months ago
Privacy Issues in Vehicular Ad Hoc Networks
Vehicular Ad hoc NETworks (VANETs) demand a thorough investigation of privacy related issues. On one hand, users of such networks have to be prevented from misuse of their private ...
Florian Dötzer
IEEESCC
2007
IEEE
15 years 6 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
CCS
2007
ACM
15 years 6 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 5 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu