Sciweavers

3299 search results - page 119 / 660
» Privacy and Trusted Computing
Sort
View
151
Voted
SDMW
2004
Springer
15 years 10 months ago
Experimental Analysis of Privacy-Preserving Statistics Computation
The recent investigation of privacy-preserving data mining and other kinds of privacy-preserving distributed computation has been motivated by the growing concern about the privacy...
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqian...
SDMW
2009
Springer
15 years 9 months ago
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity
A “friend finder” is a Location Based Service (LBS) that informs users about the presence of participants in a geographical area. In particular, one of the functionalities of ...
Sergio Mascetti, Claudio Bettini, Dario Freni
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 11 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
SRDS
2010
IEEE
15 years 2 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
ECSCW
1993
15 years 5 months ago
Design for Privacy in Ubiquitous Computing Environments
Abstract: Current developments in information technology are leading to increasing capture and storage of information about people and their activities. This raises serious issues ...
Victoria Bellotti, Abigail Sellen