Sciweavers

2454 search results - page 28 / 491
» Privacy in the Information and Communications Technologies
Sort
View
68
Voted
JIKM
2002
104views more  JIKM 2002»
14 years 9 months ago
Implementing KM in an Information Technology Environment: a Practical Approach
The emergence of knowledge-based organisations has seen an emphasis shift to recognising people as the prime competitive asset and the push of management to nurture social capital...
Jayakrishnan Balachandran, Schubert Foo
FC
2009
Springer
121views Cryptology» more  FC 2009»
15 years 4 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
CHI
2006
ACM
15 years 10 months ago
Tensions in designing capture technologies for an evidence-based care community
Evidence-based care is an increasingly popular process for long term diagnosis and monitoring of education and healthcare disabilities. Because this evidence must also be collecte...
Gillian R. Hayes, Gregory D. Abowd
IV
2006
IEEE
190views Visualization» more  IV 2006»
15 years 3 months ago
Analyzing Actors and Their Discussion Topics by Semantic Social Network Analysis
iQuest is a novel software system to improve understanding of organizational phenomena with greater precision, clarity, and granularity than has previously been possible. It permi...
Peter A. Gloor, Yan Zhao
PKC
2010
Springer
126views Cryptology» more  PKC 2010»
15 years 1 months ago
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate
A fundamental privacy problem in the client-server setting is the retrieval of a record from a database maintained by a server so that the computationally bounded server remains ob...
Jens Groth, Aggelos Kiayias, Helger Lipmaa