-
6
-
-
0035791053
-
Securing context-aware applications using environment roles
-
Covington, M., Long, W., Srinivasan, S., Dey, A., Ahamad, M., Abowd, G.: Securing context-aware applications using environment roles. In: ACM Workshop on Role Based Access Control (2001)
-
ACM Workshop on Role Based Access Control (2001)
-
-
Covington, M.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
7
-
-
78449286122
-
-
for Standardization, I.O.: ISO9 ISO IS 15408
-
for Standardization, I.O.: ISO9 ISO IS 15408 (1999), http://www.iso.org/ iso/ en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=40613
-
(1999)
-
-
-
8
-
-
33745883087
-
-
May
-
Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity and identity management a consolidated proposal for terminology (May 2006), http://dud.inf.tu-dresden.de/Anon-Terminology.shtml
-
(2006)
Anonymity, Unlinkability, Unobservability, Pseudonymity and Identity Management a Consolidated Proposal for Terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
9
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM SIGMOD Record 1(33) (2004)
-
(2004)
ACM SIGMOD Record
, vol.1
, Issue.33
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
11
-
-
18144363375
-
Web services: Problems and future directions
-
Wang, H., Huang, J., Qu, Y., Xi, J.: Web services: problems and future directions. Journal of Web Semantics 1 (2004)
-
(2004)
Journal of Web Semantics
, vol.1
-
-
Wang, H.1
Huang, J.2
Qu, Y.3
Xi, J.4
-
14
-
-
0036793924
-
Denial of services in sensor networks
-
October
-
Wood, A., Stankovic, J.: Denial of services in sensor networks. IEEE Computer (October 2002)
-
(2002)
IEEE Computer
-
-
Wood, A.1
Stankovic, J.2
-
16
-
-
0040871512
-
Knowledge discovery as a threat to database security
-
AAAI/MIT Press
-
O'Leary, D.E.: Knowledge discovery as a threat to database security. In: Knowledge Discovery in Databases. AAAI/MIT Press (1991)
-
(1991)
Knowledge Discovery in Databases
-
-
O'Leary, D.E.1
-
18
-
-
26444575051
-
Defining privacy for data mining
-
Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining privacy for data mining. In: Natural Science Foundation Workshop on Next Generation Data Mining, pp. 126- 133 (2002)
-
(2002)
Natural Science Foundation Workshop on next Generation Data Mining
, pp. 126-133
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
-
19
-
-
78449275680
-
Privacy-preserving collaborative sequential pattern mining
-
Zhan, J.Z., Chang, L.W., Matwin, S.: Privacy-preserving collaborative sequential pattern mining. In: Proceedings of Workshop on Link Analysis, Counter-terrorism and Privacy (2004)
-
Proceedings of Workshop on Link Analysis, Counter-terrorism and Privacy (2004)
-
-
Zhan, J.Z.1
Chang, L.W.2
Matwin, S.3
-
23
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
Mokbel, M.F., Chow, C., Aref, W.G.: The new casper: Query processing for location services without compromising privacy. In: Proceedings of VLDB 2006 (2006)
-
Proceedings of VLDB 2006 (2006)
-
-
Mokbel, M.F.1
Chow, C.2
Aref, W.G.3
-
24
-
-
34247339523
-
Protecting privacy against location-based personal identification
-
Bettini, C., SeanWang, X., Jajodia, S.: Protecting privacy against location-based personal identification. In: Proceedings of 2nd VLDB Workshop on Secure Data Management, SDM (2005)
-
Proceedings of 2nd VLDB Workshop on Secure Data Management, SDM (2005)
-
-
Bettini, C.1
SeanWang, X.2
Jajodia, S.3
|