Sciweavers

1790 search results - page 90 / 358
» On Privacy Models for RFID
Sort
View
VLDB
2005
ACM
135views Database» more  VLDB 2005»
15 years 11 months ago
Distributed Privacy Preserving Information Sharing
In this paper, we address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. Semi-honest beha...
Nan Zhang 0004, Wei Zhao
DEXAW
2003
IEEE
131views Database» more  DEXAW 2003»
15 years 10 months ago
Privacy and Trusted Computing
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user ...
Juan Manuel González Nieto, Ed Dawson, Eiji...
ICWS
2007
IEEE
15 years 6 months ago
A Situation-aware Access Control based Privacy-Preserving Service Matchmaking Approach for Service-Oriented Architecture
Service matchmaking is an important process in the operation of Service-Oriented Architecture (SOA) based systems. In this process, information from both service providers and req...
Stephen S. Yau, Junwei Liu
PST
2004
15 years 6 months ago
Supporting Privacy in E-Learning with Semantic Streams
The goal of the semantic web is to facilitate the exchange of meaningful information in a form that is easy for machines to process. The goal of an e-learning system is to support ...
Lori Kettel, Christopher A. Brooks, Jim E. Greer
ACSW
2007
15 years 6 months ago
Controlling Inference: Avoiding P-level Reduction during Analysis
This paper presents a concept hierarchy-based approach to privacy preserving data collection for data mining called the P-level model. The P-level model allows data providers to d...
Adepele Williams, Ken Barker