Sciweavers

861 search results - page 16 / 173
» Ranking Privacy Policy
Sort
View
AAAI
2011
13 years 9 months ago
User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models
With smart-phones becoming increasingly commonplace, there has been a subsequent surge in applications that continuously track the location of users. However, serious privacy conc...
Justin Cranshaw, Jonathan Mugan, Norman M. Sadeh
POLICY
2009
Springer
15 years 4 months ago
Strong and Weak Policy Relations
—Access control and privacy policy relations tend to focus on decision outcomes and are very sensitive to defined terms and state. Small changes or updates to a policy language ...
Michael J. May, Carl A. Gunter, Insup Lee, Steve Z...
ETRICS
2006
15 years 1 months ago
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
To cope with the complex requirements imposed on the processing of privacy-sensitive data within enterprises, the use of automatic or semi-automatic tools is gradually becoming in...
Dominik Raub, Rainer Steinwandt
CSFW
2000
IEEE
15 years 1 months ago
Towards Automatic Verification of Authentication Protocols on an Unbounded Network
Schneider's work on rank functions [14] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only wit...
James Heather, Steve Schneider
POLICY
2005
Springer
15 years 2 months ago
Enhancing Web Privacy Protection through Declarative Policies
The Platform for Privacy Preferences (P3P) is a W3C framework for web privacy management. It provides a standard vocabulary that websites can use to describe their privacy practic...
Pranam Kolari, Li Ding, Shashidhara Ganjugunte, An...