Sciweavers

1402 search results - page 172 / 281
» Personalized privacy preservation
Sort
View
PERCOM
2006
ACM
16 years 7 days ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
83
Voted
ASUNAM
2009
IEEE
15 years 7 months ago
Prying Data out of a Social Network
—Preventing adversaries from compiling significant amounts of user data is a major challenge for social network operators. We examine the difficulty of collecting profile and ...
Joseph Bonneau, Jonathan Anderson, George Danezis
94
Voted
SDMW
2009
Springer
15 years 7 months ago
An Access Control Language for a General Provenance Model
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
IEEEARES
2007
IEEE
15 years 7 months ago
CASSIS - Computer-based Academy for Security and Safety in Information Systems
Information technologies and society are highly interwoven nowadays, but in both, the private and business sector, users are often not aware of security issues or lack proper secu...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
COMPSAC
2006
IEEE
15 years 6 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver