Sciweavers

2454 search results - page 24 / 491
» Privacy in the Information and Communications Technologies
Sort
View
148
Voted
ICDE
2003
IEEE
119views Database» more  ICDE 2003»
15 years 11 months ago
Implementing P3P Using Database Technology
Platform for Privacy Preferences (P3P) is the most significant effort currently underway to enable web users to gain control over their private information. P3P provides mechanism...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
ACSAC
1997
IEEE
15 years 1 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford
61
Voted
ECSCW
1993
14 years 11 months ago
Design for Privacy in Ubiquitous Computing Environments
Abstract: Current developments in information technology are leading to increasing capture and storage of information about people and their activities. This raises serious issues ...
Victoria Bellotti, Abigail Sellen
PODS
2003
ACM
156views Database» more  PODS 2003»
15 years 9 months ago
Limiting privacy breaches in privacy preserving data mining
There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One app...
Alexandre V. Evfimievski, Johannes Gehrke, Ramakri...
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
15 years 3 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell