Sciweavers

3299 search results - page 558 / 660
» Privacy and Trusted Computing
Sort
View
153
Voted
ITCC
2005
IEEE
15 years 9 months ago
Semantic Grid - Interoperability Solution for Construction VO?
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows colla...
Ziga Turk, Matevz Dolenc, Vlado Stankovski, Etiel ...
WECWIS
2005
IEEE
137views ECommerce» more  WECWIS 2005»
15 years 9 months ago
Using Singular Value Decomposition Approximation for Collaborative Filtering
Singular Value Decomposition (SVD), together with the Expectation-Maximization (EM) procedure, can be used to find a low-dimension model that maximizes the loglikelihood of obser...
Sheng Zhang, Weihong Wang, James Ford, Fillia Make...
CHIMIT
2007
ACM
15 years 8 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 8 months ago
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that on input of an encryption x with x of bit length x and a public ‘mod...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
IHI
2010
141views Healthcare» more  IHI 2010»
14 years 11 months ago
Towards a definition of health informatics ethics
Information technology is a prominent tool in healthcare management. However, healthcare systems often fall short of addressing concerns about privacy, confidentiality and safety ...
Hamman W. Samuel, Osmar R. Zaïane, Dick Sobse...