Sciweavers

1790 search results - page 68 / 358
» On Privacy Models for RFID
Sort
View
CAISE
2008
Springer
15 years 1 months ago
Modelling, Simulation, and Performance Analysis of Business Processes Involving Ubiquitous Systems
A recent trend in Ubiquitous Computing is that embedded software (e.g. in production machines, wired or wireless networked sensors and actuators, or RFID readers) directly offers W...
Patrik Spieß, Dinh Khoa Nguyen, Ingo Weber, ...
ADC
2007
Springer
150views Database» more  ADC 2007»
15 years 6 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi
DEON
2010
Springer
15 years 4 months ago
Privacy Policies with Modal Logic: The Dynamic Turn
Abstract. Privacy policies are often defined in terms of permitted messages. Instead, in this paper we derive dynamically the permitted messages from static privacy policies defi...
Guillaume Aucher, Guido Boella, Leendert van der T...
ISI
2006
Springer
14 years 12 months ago
Inferring Privacy Information from Social Networks
Since privacy information can be inferred via social relations, the privacy confidentiality problem becomes increasingly challenging as online social network services are more popu...
Jianming He, Wesley W. Chu, Zhenyu Liu
EDBT
2012
ACM
262views Database» more  EDBT 2012»
13 years 2 months ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam