Sciweavers

861 search results - page 25 / 173
» Ranking Privacy Policy
Sort
View
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
15 years 3 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell
POLICY
2007
Springer
15 years 3 months ago
Towards Privacy-Aware Handling of Authorizations
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Wolfgang Dobmeier, Günther Pernul
SEMWEB
2007
Springer
15 years 3 months ago
Recommendation Privacy Protection in Trust-based Knowledge Sharing Network
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Weisen Guo, Steven B. Kraines
PERCOM
2010
ACM
14 years 8 months ago
Privacy Butler: A personal privacy rights manager for online presence
Abstract—The online presence projected by a person is comprised of all the information about them available on the Internet. In online communities and social networking services,...
Ryan Wishart, Domenico Corapi, Anil Madhavapeddy, ...
ACSAC
2008
IEEE
14 years 11 months ago
Assessing Quality of Policy Properties in Verification of Access Control Policies
Access control policies are often specified in declarative languages. In this paper, we propose a novel approach, called mutation verification, to assess the quality of properties...
Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu