Sciweavers

1906 search results - page 131 / 382
» Data Privacy
Sort
View
HICSS
2006
IEEE
137views Biometrics» more  HICSS 2006»
15 years 9 months ago
Identity Management and Data Sharing in the European Union
Citizens and enterprises in the European Union benefit from a common internal market and other freedoms. The resulting and growing mobility and cross-border collaboration necessit...
Benoît Otjacques, Patrik Hitzelberger, Ferna...
124
Voted
IVS
2006
127views more  IVS 2006»
15 years 3 months ago
Feature hiding in 3D human body scans
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Joseph Laws, Nathaniel Bauernfeind, Yang Cai 0002
HICSS
2011
IEEE
203views Biometrics» more  HICSS 2011»
14 years 7 months ago
Will HITECH Heal Patient Data Hemorrhages?
Hemorrhages of confidential patient health data create privacy and security concerns. While the US HIPAA legislation on privacy and security went into effect over five years ago, ...
M. Eric Johnson, Nicholas D. Willey
120
Voted
ACSAC
2000
IEEE
15 years 7 months ago
Two State-based Approaches to Program-based Anomaly Detection
This paper describes two recently developed intrusion detection algorithms, and gives experimental results on their performance. The algorithms detect anomalies in execution audit...
Christoph C. Michael, Anup K. Ghosh
ACMICEC
2003
ACM
90views ECommerce» more  ACMICEC 2003»
15 years 8 months ago
Automated analysis of P3P-enabled Web sites
The Platform for Privacy Preferences (P3P) provides a standard computer-readable format for privacy policies and a protocol that enables web browsers to read and process these pol...
Simon Byers, Lorrie Faith Cranor, David P. Kormann