Sciweavers

2454 search results - page 75 / 491
» Privacy in the Information and Communications Technologies
Sort
View
IJMI
2007
140views more  IJMI 2007»
15 years 1 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
GIS
2009
ACM
16 years 2 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
SOUPS
2010
ACM
15 years 5 months ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
EUNIS
2001
15 years 2 months ago
Intranet based executive system of the Faculty of Business and Management at Brno, University of Technology
: This contribution deals with the use of the Internet with the aim to support the studies at the Brno university of Technology, Czech Republic. The paper contents the main princip...
Gabriela Bláhová, Jirí Hluch&...
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
16 years 1 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau