Sciweavers

490 search results - page 43 / 98
» Enabling User Control with Personal Identity Management
Sort
View
123
Voted
CIKM
2010
Springer
14 years 11 months ago
Preserving location and absence privacy in geo-social networks
Online social networks often involve very large numbers of users who share very large volumes of content. This content is increasingly being tagged with geo-spatial and temporal c...
Dario Freni, Carmen Ruiz Vicente, Sergio Mascetti,...
111
Voted
EDOC
2008
IEEE
15 years 7 months ago
Managing the Life Cycle of Access Rules in CEOSIS
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Stefanie Rinderle-Ma, Manfred Reichert
100
Voted
ACSC
2005
IEEE
15 years 6 months ago
A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments
The mobility characteristic brings new challenges for research of P2P computing over the wireless mobile networking environment. Peers’ movements in wireless mobile network chan...
Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu
71
Voted
WPES
2005
ACM
15 years 6 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
97
Voted
ACSC
2009
IEEE
15 years 7 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank