Sciweavers

5119 search results - page 186 / 1024
» Security Privacy
Sort
View
SDMW
2007
Springer
15 years 10 months ago
A Three-Dimensional Conceptual Framework for Database Privacy
Database privacy is an ambiguous concept, whose meaning is usually context-dependent. We give a conceptual framework for technologies in that field in terms of three dimensions, d...
Josep Domingo-Ferrer
TRUSTBUS
2010
Springer
15 years 2 months ago
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression
We propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging so...
Javier Parra-Arnau, David Rebollo-Monedero, Jordi ...
IWSEC
2010
Springer
15 years 2 months ago
Security Metrics and Security Investment Models
Abstract. Planning information security investment is somewhere between art and science. This paper reviews and compares existing scientific approaches and discusses the relation ...
Rainer Böhme
116
Voted
ICAIL
2007
ACM
15 years 8 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
CCS
2004
ACM
15 years 9 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers