Sciweavers

30 search results - page 5 / 6
» Countering Terrorism through Information and Privacy Protect...
Sort
View
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
14 years 1 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang
CCS
2010
ACM
14 years 1 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
SISW
2003
IEEE
13 years 11 months ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...
ACSAC
1999
IEEE
13 years 10 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
KES
2005
Springer
13 years 11 months ago
An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing
Cancelable biometrics has been proposed for canceling and re-issuing biometric templates and for protecting privacy in biometrics systems. Recently, new cancelable biometric approa...
King Hong Cheung, Adams Wai-Kin Kong, David Zhang,...