Showing 1 - 9 of 9
Assessing the trustworthiness of location data corresponding to individuals is essential in several applications, such as forensic science and epidemic control. To obtain accurate and trustworthy location data, analysts must often gather and correlate information from several independent...
Persistent link: https://www.econbiz.de/10009483166
is represented by automated trust negotiation systems. Trust negotiation systems allow subjects in different security …
Persistent link: https://www.econbiz.de/10009430311
security analysis details security properties is also offered. …
Persistent link: https://www.econbiz.de/10009430312
An important issue any organization or individual has to face when managing data containing sensitive information, is the risk that can be incurred when releasing such data. Even though data may be sanitized, before being released, it is still possible for an adversary to reconstruct the...
Persistent link: https://www.econbiz.de/10009430348
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that are close to each other according to some distance functions, such that no additional information other than the join...
Persistent link: https://www.econbiz.de/10009430495
have several essential security and privacy properties. We present a basic yet reasonably expressive language which …
Persistent link: https://www.econbiz.de/10009430549
In this paper we highlight the need for privacy of user data used in digital identity management systems. We investigate the issues from the individual, business, and government perspectives. We provide surveys related to the growing problem of identity theft and the sociological concerns of...
Persistent link: https://www.econbiz.de/10009430550
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration...
Persistent link: https://www.econbiz.de/10009430789
An important issue any organization or individual has to face when managing data containing sensitive information, is the risk that can be incurred when releasing such data. Even though data may be sanitized before being released, it is still possible for an adversary to reconstruct the original...
Persistent link: https://www.econbiz.de/10009430800