Filters








596 Hits in 4.8 sec

Privacy-Enhanced Web Service Composition

Salah-Eddine Tbahriti, Chirine Ghedira, Brahim Medjahed, Michael Mrissa
2014 IEEE Transactions on Services Computing  
We propose a negotiation mechanism that makes it possible to dynamically reconcile the privacy capabilities of services when incompatibilities arise in a composition.  ...  The privacy model allows a service to define a privacy policy and a set of privacy requirements.  ...  De Vettor for his contribution to the development of the experiments, and J. Fayn for her help in the realization of the scenarios.  ... 
doi:10.1109/tsc.2013.18 fatcat:hbatr6fimrfjdiu7klrqjgmpxq

An Analysis Grid for Privacy-Related Properties of Social Network Systems

Regina Marin, Guillaume Piolle, Christophe Bidan
2013 2013 International Conference on Social Computing  
Based on the analysis grid result, this paper also presents the application of latticebased tools to classify and visualize social network systems in privacy-related hierarchies.  ...  Most current SNSs are based on centralized designs, which are less likely to improve privacy since there is a single and central authority with exclusive administration control over user information.  ...  In the SNS context, unobservability means the capacity of a peer to perform an action without others being aware of these actions. 4) Privacy Policy Management: It encompasses policy administration and  ... 
doi:10.1109/socialcom.2013.79 dblp:conf/socialcom/MarinPB13 fatcat:rwmlr44p5zgcfc5lqty32durge

Rational exposure: A game theoretic approach to optimize identity exposure in pervasive computing environments

Feng Zhu, Wei Zhu
2009 2009 IEEE International Conference on Pervasive Computing and Communications  
It finds the most general identity information that a user wants to expose and a service provider accepts.  ...  It expresses one's identity information from precise to general. We model privacy exposure as an extensive game.  ...  Danny Soroker for helping them to greatly improve this paper. The authors thank Dr. Sandra Carpenter for fruitful discussions and thank the anonymous reviewers for their valuable comments.  ... 
doi:10.1109/percom.2009.4912755 dblp:conf/percom/ZhuZ09 fatcat:kgpscihat5g4pfsz3fljcuwrum

Linear Cryptanalysis for Block Ciphers [chapter]

Johannes Gehrke, Daniel Kifer, Ashwin Machanavajjhala, Arjen K. Lenstra, Phong Nguyen, Phong Nguyen, Daniele Micciancio, Scott Contini, Sabrina De Capitani diVimercati, Burt Kaliski, Stephen M Papa, William D. Casper (+13 others)
2011 Encyclopedia of Cryptography and Security  
Definition ℓ-diversity is a method for publishing data about individuals while limiting the amount of sensitive information disclosed about them.  ...  In perspective, rule-based trust negotiation frameworks may take advantage of the Rule Interchange Format WC standard (www.w.org//rules/) to publish and exchange policies.  ...  ., point of interest, context-aware tourist guides, or weather and traffic alerts).  ... 
doi:10.1007/978-1-4419-5906-5_589 fatcat:zn4blza5ezggzhayzeuxeix5oa

The Cloud: Understanding the Security, Privacy and Trust Challenges

Neil Robinson, Lorenzo Valeri, Jonathan Cave, Tony Starkey, Hans Graux, Sadie Creese, Paul P. Hopkins
2010 Social Science Research Network  
Project Officers Bart van Caenegem, Valeria Bricola and Mario Scillia from the European Commission, Directorate-General Information Society and Media Unit F.5 (Trust and Security) for their helpful and  ...  and takedown regimes in 2000/31/EC international context 2.2 Liability rules for intermediary services providers; applicability in the cloud 2.3 Transparency rules 2.4 Applicable law is again linked to  ...  health information records (based on patient data) and a general health information database (based on medical knowledge), and for consumers to get information on physicians, their locations and addresses  ... 
doi:10.2139/ssrn.2141970 fatcat:djodoaep2zaxdppfueavfx5cle

From Conventional to State-of-the-Art IoT Access Control Models

Ahmad Kamran Malik, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, Mohammad A. Alqarni
2020 Electronics  
This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific.  ...  Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services.  ...  Acknowledgments: The authors acknowledge with thanks Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, Saudi Arabia for technical and financial support.  ... 
doi:10.3390/electronics9101693 fatcat:mtvlbubbyvbx5ph2bnfwnmlbqa

A Formal Privacy System and Its Application to Location Based Services [chapter]

Carl A. Gunter, Michael J. May, Stuart G. Stubblebine
2005 Lecture Notes in Computer Science  
This illustration is carried out throuh a case study of a privacy-respecting system for location based services.  ...  the specification and negotiation of privacy rights.  ...  [16] describe a similar system for privacy-respecting location aware services based on a broker agent architecture, persistent pseudonyms for each user, and P3P.  ... 
doi:10.1007/11423409_17 fatcat:nqmkka3qm5df5e3q7fm5tqbizu

A roadmap for comprehensive online privacy policy management

Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu
2007 Communications of the ACM  
Effective solutions for privacy protection are of interest to industry, government and society at large, but the challenge is to satisfy the oftenconflicting requirements of all these stakeholders.  ...  Information technology advances are making Internet and Web-based system use the common choice in many application domains, ranging from business to healthcare to scientific collaboration and distance  ...  Privacy policies allow enterprises and Internet users to communicate and negotiate privacy practices, and make online service privacy-aware.  ... 
doi:10.1145/1272516.1272522 fatcat:optjvlmf2zg4pllr2nm4ll7tza

Towards pervasive instant messaging and presence awareness

Xiaolei Zhang, Chun‐Fai Law, Cho‐Li Wang, Francis C.M. Lau, J.H. Abawajy
2009 International Journal of Pervasive Computing and Communications  
To realize this vision, the design of a Smart Instant Messaging (SIM) system is proposed, which features context-aware presence management, user-centric resource configuration, and adaptive grouping.  ...  This system extends the Jabber-based IM framework and relies on an ontology-based supporting middleware to handle the chore of retrieving and interpreting contextual information.  ...  Our design for presence awareness targets at a generic service that could benefit a wide range of applications.  ... 
doi:10.1108/17427370910950302 fatcat:mircs4abxnesjaw6pxpbvo6mtq

Property Based Coordination [chapter]

Mahdi Zargayouna, Julien Saunier Trassy, Flavien Balbo
2006 Lecture Notes in Computer Science  
For a multiagent system (MAS), coordination is the assumption that agents are able to adapt their behavior according to those of the other agents.  ...  It enables to build up an interaction as a connection point between the needs of the initiator, those of the receptor(s) and a given context.  ...  Based on the notion of observability, it generalizes existing cooperation schemas as the Capability Based Cooperation, Agent Group Role, Overhearing, Mutual Awareness etc.  ... 
doi:10.1007/11861461_3 fatcat:rxt6ubgeljdopoi5xrovhoi74u

Internet of things security: A top-down survey

Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef
2018 Computer Networks  
Finally, we give a general classification of existing solutions and comparison based on important parameters.  ...  This technology offers a huge business value for organizations and provides opportunities for many existing applications such as energy, healthcare and other sectors.  ...  Besides the decision making process, context-awareness approaches participate also to enhance the security enforcement decisions based on the analysis conducted on the context.  ... 
doi:10.1016/j.comnet.2018.03.012 fatcat:xbczp44t6neqxcfy74q6rsvuci

A survey of trust in computer science and the Semantic Web

Donovan Artz, Yolanda Gil
2007 Journal of Web Semantics  
For example, exchanging money for a service, giving access to your property, and choosing between conflicting sources of information all may utilize some form of trust.  ...  Trust is an essential component of the vision for the Semantic Web, where both new problems and new applications of trust are being studied.  ...  Acknowledgements We would like to thank the anonymous reviewers for their valuable comments and feedback on this work.  ... 
doi:10.1016/j.websem.2007.03.002 fatcat:35nvnm3hkvb63n7t2frlaucq3i

A Survey of Trust in Computer Science and the Semantic Web

Donovan Artz, Yolanda Gil
2007 Social Science Research Network  
For example, exchanging money for a service, giving access to your property, and choosing between conflicting sources of information all may utilize some form of trust.  ...  Trust is an essential component of the vision for the Semantic Web, where both new problems and new applications of trust are being studied.  ...  Acknowledgements We would like to thank the anonymous reviewers for their valuable comments and feedback on this work.  ... 
doi:10.2139/ssrn.3199355 fatcat:tvwxeswjqvbcfco2bgkgr7imau

Student privacy self-management

Paul Prinsloo, Sharon Slade
2015 Proceedings of the Fifth International Conference on Learning Analytics And Knowledge - LAK '15  
As such, it can be easy to allow our enthusiasm for the possibilities offered by learning analytics to outweigh consideration of issues of privacy.  ...  Optimizing the harvesting and analysis of student data promises to clear the fog surrounding the key drivers of student success and retention, and provide potential for improved student success.  ...  Despite a general belief that individuals base their decisions on rational processes, we underestimate the "bounded rationality" people have as they negotiate meaning and compromise priorities within complex  ... 
doi:10.1145/2723576.2723585 dblp:conf/lak/PrinslooS15 fatcat:npfzrena75glfizowdtwiwrgdm

Technical sessions

2007 2007 12th IEEE Symposium on Computers and Communications  
Service differentiation is achieved at the session signaling level by relying on a context-aware resource allocation strategy.  ...  These algorithms are random-selectionbased, service-based, and load-based JCAC algorithms. Our approach is based on decomposing heterogeneous cellular networks into groups of colocated cells.  ...  In particular, WSN will play an important role in context aware applications and services, which adapt to situations of the surrounding environment and that of their host devices.  ... 
doi:10.1109/iscc.2007.4381658 fatcat:fu7k2cap6bct5edk63zejhtk7q
« Previous Showing results 1 — 15 out of 596 results