Sciweavers

128 search results - page 15 / 26
» The Boundary Between Privacy and Utility in Data Publishing
Sort
View
TRUSTBUS
2010
Springer
14 years 10 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall
90
Voted
SOSE
2008
IEEE
15 years 6 months ago
A Gateway Design for Message Passing on the SOA Healthcare Platform
Various security and privacy issues have emerged from the SOA healthcare platform. Large amounts of personal data are transmitted daily through the SOA healthcare platform. For se...
Chi-Lu Yang, Yeim-Kuan Chang, Chih-Ping Chu
ESMART
2001
Springer
15 years 4 months ago
Use of Biometrics for User Verification in Electronic Signature Smartcards
If a smartcard provides security functions such as electronic signature creation, valuables such as electronic money and/or sensitive data such as medical data, then the smartcard ...
Bruno Struif
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
15 years 12 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
MIR
2004
ACM
189views Multimedia» more  MIR 2004»
15 years 5 months ago
Repeating pattern discovery and structure analysis from acoustic music data
Music and songs usually have repeating patterns and prominent structure. The automatic extraction of such repeating patterns and structure is useful for further music summarizatio...
Lie Lu, Muyuan Wang, HongJiang Zhang