Sciweavers

177 search results - page 17 / 36
» Privacy Preserving Collaborative Business Process Management
Sort
View
90
Voted
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
15 years 10 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
80
Voted
WECWIS
2002
IEEE
124views ECommerce» more  WECWIS 2002»
15 years 2 months ago
Flexible Inter-Enterprise Workflow Management using E-Services
This paper presents a solution to achieve dynamic Inter-enterprise workflow management using the eservices provided by collaborative e-business enterprises. E-services are distrib...
Jie Meng, Raja Krithivasan, Stanley Y. W. Su, Abde...
72
Voted
SECRYPT
2010
129views Business» more  SECRYPT 2010»
14 years 7 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...
JCST
2008
109views more  JCST 2008»
14 years 9 months ago
WWW Business Applications Based on the Cellular Model
A cellular model based on the Incrementally Modular Abstraction Hierarchy (IMAH) is a novel model that can represent the architecture of and changes in cyberworlds, preserving inva...
Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki
107
Voted
LOCA
2009
Springer
15 years 4 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung