Sciweavers

81 search results - page 5 / 17
» Controlling information release in the pi-calculus
Sort
View
ACSW
2007
14 years 11 months ago
Controlling Inference: Avoiding P-level Reduction during Analysis
This paper presents a concept hierarchy-based approach to privacy preserving data collection for data mining called the P-level model. The P-level model allows data providers to d...
Adepele Williams, Ken Barker
WSC
1996
14 years 11 months ago
Controlling Activities in a Virtual Manufacturing Cell
Researchers at the National Institute of Standards and Technology are developing a virtual manufacturing cell. This cell will contain simulation models of a wide range of manufact...
Michael Iuliano, Albert Jones
DIM
2008
ACM
14 years 11 months ago
Minimal credential disclosure in trust negotiations
The secure release of identity attributes is a key enabler for electronic business interactions. In particular, integrity and confidentiality of identity attributes are two key re...
Federica Paci, David Bauer, Elisa Bertino, Douglas...
CCS
2008
ACM
14 years 11 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
EHEALTH
2008
154views Healthcare» more  EHEALTH 2008»
14 years 11 months ago
Event-Based Data Dissemination Control in Healthcare
There is a movement in healthcare towards preventative care. This shift involves using technology to assist in care provision outside traditional care institutions -- for instance,...
Jatinder Singh, Jean Bacon