Search results

Jump to: navigation, search
  • · Privacy and Anonymity · Security Policy and Enforcement Issues
    4 KB (485 words) - 17:07, 27 February 2009
  • ...configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing environment. * Security policy deployment
    3 KB (480 words) - 17:08, 27 February 2009
  • * Privacy Protection * Security Policy
    4 KB (530 words) - 15:02, 27 December 2015
  • USSAF: User safety, privacy, and protection over Internet ...smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instan
    14 KB (1,651 words) - 15:56, 15 February 2017
  • - e-Privacy - e-Health Policy and Practice
    4 KB (507 words) - 22:37, 18 November 2009
  • * Government, and corporate Internet security policy * Trust, privacy, and data security
    5 KB (607 words) - 18:01, 3 December 2009
  • |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust
    4 KB (484 words) - 14:20, 14 December 2009
  • ...uality issues in such systems; information assurance, security, and public policy. Doctoral students are encouraged to propose papers on ongoing research. * Trust and privacy
    10 KB (1,270 words) - 17:12, 20 April 2010
  • • Information sharing policy and governance<br> • Privacy, security, and civil liberties issues<br>
    4 KB (429 words) - 08:55, 1 August 2019
  • *Information sharing policy and governance<br> *Privacy, security, and civil liberties issues<br>
    9 KB (1,092 words) - 09:35, 1 August 2019
  • - Anonymity, user privacy, and location privacy in UE - Surveillance and Privacy-enhancing technologies in UE
    3 KB (498 words) - 02:52, 22 December 2012
  • * Security Policy * Privacy
    2 KB (217 words) - 16:50, 19 November 2020
  • * Foundations of Privacy, Trust and Reputation in Network According to the ICALP policy, for every accepted paper it is required that at least one author attends t
    4 KB (602 words) - 06:44, 26 August 2020
  • ...grammers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 29th USENIX Security Symposium will b ...ns are solicited in all areas relating to systems research in security and privacy, including but not limited to:
    3 KB (343 words) - 16:31, 6 May 2020
  • - e-Privacy - e-Health Policy and Practice
    6 KB (732 words) - 05:52, 5 December 2010
  • * Security Policy * Privacy
    2 KB (217 words) - 16:57, 27 December 2015
  • Trust, Security and Privacy in embedded systems Trust, Security and Privacy in social networks
    4 KB (451 words) - 12:27, 30 November 2011
  • - e-Privacy - e-Health Policy and Practice
    5 KB (595 words) - 05:03, 15 January 2012
  • Standardization (IEEE 802.17, Policy Models, Etc.); IEEE 802.11 engineering; Telecommunications protocol enginee ...nagement; Measurement, monitoring and supervision techniques; Security and privacy in optical networks; Optical access networks designs and protocols; High sp
    13 KB (1,580 words) - 19:35, 18 February 2021
  • *Information sharing policy and governance<br> *Privacy, security, and civil liberties issues<br>
    5 KB (575 words) - 10:16, 1 August 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)