Sciweavers

2454 search results - page 70 / 491
» Privacy in the Information and Communications Technologies
Sort
View
SRDS
2010
IEEE
14 years 11 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
CSFW
2007
IEEE
15 years 5 months ago
Secure information flow and program logics
We present interpretations of type systems for secure information flow in Hoare logic, complementing previous encodings in binary (e.g. relational) program logics. Treating base-l...
Lennart Beringer, Martin Hofmann
SDMW
2009
Springer
15 years 6 months ago
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity
A “friend finder” is a Location Based Service (LBS) that informs users about the presence of participants in a geographical area. In particular, one of the functionalities of ...
Sergio Mascetti, Claudio Bettini, Dario Freni
GAMESEC
2011
287views Game Theory» more  GAMESEC 2011»
14 years 1 months ago
Collaborative Location Privacy with Rational Users
Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with the...
Francisco Santos, Mathias Humbert, Reza Shokri, Je...
ECIS
2001
15 years 2 months ago
Communities - The Role of Technology
Information and communication technology provides design options for the creation of economic value. We consider a particular architecture for the creation of economic value: the ...
Johannes Hummel, Ulrike Lechner