Sciweavers

1790 search results - page 80 / 358
» On Privacy Models for RFID
Sort
View
SAJ
2002
97views more  SAJ 2002»
15 years 5 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
163
Voted
LOCWEB
2009
ACM
15 years 12 months ago
Binding privacy rules to location on the web
As a tool for mitigating the potential privacy risks of gathering and transmitting location information on the Web, we suggest in this paper a model for conveying location informa...
Alissa Cooper, John Morris
128
Voted
TRUST
2009
Springer
15 years 12 months ago
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels
Hans Löhr, Ahmad-Reza Sadeghi, Christian St&u...
109
Voted
CSUR
2010
200views more  CSUR 2010»
15 years 2 months ago
Business process modeling languages: Sorting through the alphabet soup
Hafedh Mili, Guy Tremblay, Guitta Bou Jaoude, Eric...
PERVASIVE
2007
Springer
15 years 11 months ago
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ cont...
Apu Kapadia, Tristan Henderson, Jeffrey J. Fieldin...