Sciweavers

2454 search results - page 26 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ADC
2007
Springer
150views Database» more  ADC 2007»
15 years 3 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi
ACISP
2004
Springer
15 years 3 months ago
Single Database Private Information Retrieval with Logarithmic Communication
In this paper, we study the problem of single database private information retrieval, and present schemes with only logarithmic server-side communication complexity. Previously th...
Yan-Cheng Chang
DIM
2005
ACM
14 years 11 months ago
Privacy and identity management for everyone
Jan Camenisch, Abhi Shelat, Dieter Sommer, Simone ...
IJMMS
2008
68views more  IJMMS 2008»
14 years 9 months ago
Mobile technologies in mobile spaces: Findings from the context of train travel
Whilst mobile work is increasingly prevalent, there is little detailed study of this phenomenon in the specific context of a train. Thus, the current study focuses on how mobile w...
Carolyn M. Axtell, Donald Hislop, Steve Whittaker
IPMU
2010
Springer
14 years 8 months ago
Keeping Secrets in Possibilistic Knowledge Bases with Necessity-Valued Privacy Policies
Controlled Query Evaluation (CQE) is a logical framework for the protection of secrets in databases. In this article, we extend the CQE framework to possibilistic logic: knowledge ...
Lena Wiese