Search results

Jump to: navigation, search
  • ...networks to exist; within groups and between groups there are problems of privacy, identity, anonymity, trust, and confidentiality. Additionally, conflict, d ...utomation of contracting and contract monitoring on the web, protection of privacy in location-based computing, etc.
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ..., controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. ...elated Security and Privacy: Trust-related secure architecture, framework, policy, intrusion detection/awareness, protocols, etc.
    9 KB (1,216 words) - 17:32, 14 October 2008
  • * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques * Policy & Regulatory Issues: Spectral management, privacy issues, co-existence of RFID systems, social implications of RFID technolog
    3 KB (431 words) - 17:48, 14 October 2008
  • • Wireless network security and privacy ...els in the above mentioned topical areas or others related to business and policy-related issues and opportunities for the wireless communications industry.
    6 KB (731 words) - 10:33, 14 August 2023
  • ...ent intentionally seeks scientists, engineers, educators, industry people, policy makers, decision makers, and others who have insight, vision, and understan * Trust, reputation, security, and privacy in MBC
    5 KB (647 words) - 22:05, 14 October 2008
  • ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random ...r to July 2009, will not be considered for acceptance at STOC 2009. SIGACT policy does not allow simultaneous submissions of the same (or essentially the sam
    6 KB (869 words) - 20:22, 22 February 2009
  • * › Wireless Information Policy, Risk Assessment and Management Area 4: Wireless Information Policy, Risk Assessment and Management
    9 KB (1,219 words) - 20:05, 14 October 2008
  • ...momentum towards research in finding viable solutions to the security and privacy challenges faced by the current and future collaborative systems and infras ...l issues and practical implementations/experiences related to security and privacy solutions for collaborative systems. Topics of interest include, but are no
    4 KB (520 words) - 20:05, 14 October 2008
  • Privacy, Trust, and Security is Distributed Systems Distributed data management, Policy-Based management
    2 KB (208 words) - 20:05, 14 October 2008
  • - eHealth Policy and Practice - Patient Privacy and Confidentiality
    6 KB (780 words) - 20:06, 14 October 2008
  • - Security and Privacy: cryptography; access control; security in domain-specific applications; privacy and trust
    9 KB (1,193 words) - 22:53, 14 October 2008
  • reliability, integrity, privacy, and security issues are still being investigated. For example, in data warehousing applications, privacy
    7 KB (908 words) - 23:10, 14 October 2008
  • • Federation and policy management for •Trust, security, dependability, privacy, QoS and
    5 KB (549 words) - 17:15, 5 July 2020
  • | Acronym = Policy 2008 | Title = IEEE Policy Workshop 2008
    5 KB (667 words) - 23:13, 14 October 2008
  • * Privacy-Preserving Web Services Technologies Review Policy
    8 KB (1,158 words) - 23:14, 14 October 2008
  • * Policy, regulation and legislation * Values in multi-agent systems, including privacy, safety, security and transparency
    6 KB (659 words) - 17:41, 11 February 2021
  • ...lex, involving difficult social and policy issues such as those related to privacy and security ...nologies, information networking, human-computer interaction, security and privacy.
    8 KB (1,003 words) - 23:15, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust ...provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable inn
    6 KB (736 words) - 23:20, 14 October 2008
  • Privacy Security Policy and Procedures
    4 KB (465 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security ...nference is to share research solutions to problems of Trust, Security and Privacy and to identify new issues and directions for future research and developme
    4 KB (565 words) - 23:20, 14 October 2008
  • | Title = IEEE Symposium on Security and Privacy ...m for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
    2 KB (262 words) - 23:20, 14 October 2008
  • Review Policy: "IEEE Policy and professional ethics requires that referees treat the contents of papers
    18 KB (2,352 words) - 23:23, 14 October 2008
  • ...us access technologies under secured (still to be improved) and guaranteed privacy. The family of the mobile devices expand dramatically, allowing a user to h ...obile learning is favoured by many national and international projects and policy synchronization boards.
    6 KB (765 words) - 23:26, 14 October 2008
  • *Internet economics and policy *Security and privacy aspects of network applications and protocols
    4 KB (514 words) - 12:03, 6 April 2020
  • E-democracy, e-policy, and governance Legal and social ontologies Privacy and copyright in collaborative environments and social networks
    8 KB (1,075 words) - 23:52, 14 October 2008
  • ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random ...r to July 2008, will not be considered for acceptance at STOC 2008. SIGACT policy does not allow simultaneous submissions of the same (or essentially the sam
    5 KB (766 words) - 23:37, 14 October 2008
  • Issues of privacy of communication, data security, and Double Submission Policy
    9 KB (1,215 words) - 23:38, 14 October 2008
  • * Policy driven management for RTSOAA * Security and privacy for RTSOAA based CPS
    7 KB (922 words) - 00:58, 9 January 2009
  • ** Privacy and security ** Security and privacy
    11 KB (1,366 words) - 16:44, 14 January 2009
  • * Security, Privacy, Encryption, and Digital Rights, including o Privacy-enhancing technologies
    9 KB (1,221 words) - 12:58, 18 January 2009
  • - Privacy ...by ana.sofia@informatics-conf.org | Print / PDF version | Read our Privacy Policy.
    5 KB (633 words) - 12:58, 18 January 2009
  • and Public Policy in the Age of e-Euphoria. Conference main theme will be supported by systems; information assurance, security, and public policy. Doctoral students are
    16 KB (2,178 words) - 12:59, 18 January 2009
  • - temporal aspects of agent- and policy-based systems - privacy in temporal and spatio-temporal data
    6 KB (872 words) - 13:00, 18 January 2009
  • * Exposition of legal, business and technology policy issues relevant to multimedia security. * Multimedia network protection, privacy and security.
    3 KB (303 words) - 17:06, 24 February 2016
  • o Policy between primary user and secondary user * Wireless security and privacy
    14 KB (1,518 words) - 13:01, 18 January 2009
  • 17) Security & Privacy in Pervasive Computing environments - SPPC 09 Conference policy
    10 KB (1,321 words) - 13:01, 18 January 2009
  • * Anonymity, user privacy, and location privacy in UE * Surveillance and Privacy-enhancing technologies in UE
    6 KB (793 words) - 15:12, 1 October 2020
  • ...llaborative technologies, virtual worlds and tele-presence raise issues of privacy, management, compliance, governance, and risk. ...s by exposing problems, and uncovering potential problems, in the areas of privacy, compliance, governance, and risk. Each of these issues creates situations
    4 KB (557 words) - 16:33, 27 February 2009
  • managers, and policy makers interested in computer software and + Middleware solutions for Security, Privacy and Trust
    6 KB (800 words) - 22:11, 27 February 2009
  • ...ves. In this context analysing concepts like Trust, Reliability, Security, Privacy and Risk would help the users to make informed judgements of what their lev • Security and Privacy
    4 KB (600 words) - 17:07, 27 February 2009
  • · Privacy and Anonymity · Security Policy and Enforcement Issues
    4 KB (485 words) - 17:07, 27 February 2009
  • ...configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing environment. * Security policy deployment
    3 KB (480 words) - 17:08, 27 February 2009
  • * Privacy Protection * Security Policy
    4 KB (530 words) - 15:02, 27 December 2015
  • USSAF: User safety, privacy, and protection over Internet ...smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instan
    14 KB (1,651 words) - 15:56, 15 February 2017
  • - e-Privacy - e-Health Policy and Practice
    4 KB (507 words) - 22:37, 18 November 2009
  • * Government, and corporate Internet security policy * Trust, privacy, and data security
    5 KB (607 words) - 18:01, 3 December 2009
  • |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust
    4 KB (484 words) - 14:20, 14 December 2009
  • ...uality issues in such systems; information assurance, security, and public policy. Doctoral students are encouraged to propose papers on ongoing research. * Trust and privacy
    10 KB (1,270 words) - 17:12, 20 April 2010
  • • Information sharing policy and governance<br> • Privacy, security, and civil liberties issues<br>
    4 KB (429 words) - 08:55, 1 August 2019
  • *Information sharing policy and governance<br> *Privacy, security, and civil liberties issues<br>
    9 KB (1,092 words) - 09:35, 1 August 2019
  • - Anonymity, user privacy, and location privacy in UE - Surveillance and Privacy-enhancing technologies in UE
    3 KB (498 words) - 02:52, 22 December 2012
  • * Security Policy * Privacy
    2 KB (217 words) - 16:50, 19 November 2020
  • * Foundations of Privacy, Trust and Reputation in Network According to the ICALP policy, for every accepted paper it is required that at least one author attends t
    4 KB (602 words) - 06:44, 26 August 2020
  • ...grammers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 29th USENIX Security Symposium will b ...ns are solicited in all areas relating to systems research in security and privacy, including but not limited to:
    3 KB (343 words) - 16:31, 6 May 2020
  • - e-Privacy - e-Health Policy and Practice
    6 KB (732 words) - 05:52, 5 December 2010
  • * Security Policy * Privacy
    2 KB (217 words) - 16:57, 27 December 2015
  • Trust, Security and Privacy in embedded systems Trust, Security and Privacy in social networks
    4 KB (451 words) - 12:27, 30 November 2011
  • - e-Privacy - e-Health Policy and Practice
    5 KB (595 words) - 05:03, 15 January 2012
  • Standardization (IEEE 802.17, Policy Models, Etc.); IEEE 802.11 engineering; Telecommunications protocol enginee ...nagement; Measurement, monitoring and supervision techniques; Security and privacy in optical networks; Optical access networks designs and protocols; High sp
    13 KB (1,580 words) - 19:35, 18 February 2021
  • *Information sharing policy and governance<br> *Privacy, security, and civil liberties issues<br>
    5 KB (575 words) - 10:16, 1 August 2019
  • ...ural science, linguistics, security, criminal intelligence, health, public policy, to come together to share and present their innovative work in the social • Legal and public policy issues
    6 KB (728 words) - 01:01, 25 August 2012
  • ● Trust, Security and Privacy in embedded systems ● Trust, Security and Privacy in social networks
    5 KB (677 words) - 15:19, 19 December 2012
  • - e-Privacy - e-Health Policy and Practice
    4 KB (535 words) - 14:38, 17 January 2013
  • - e-Privacy - e-Health Policy and Practice
    5 KB (641 words) - 22:32, 29 July 2016
  • [PrivOn] Society, Privacy and the Semantic Web - Policy and Technology
    10 KB (1,424 words) - 09:54, 6 March 2020
  • ...s, Information Technology Audit, Steganalysis, Data Remanence, Information Privacy, Usable Security, etc... ...red to go through with the various instructions available under conference policy and manuscript preparation and submission link at:
    2 KB (323 words) - 13:36, 6 March 2017
  • |Title=12th International Workshop on Data Privacy Management |Field=Data Privacy
    7 KB (887 words) - 15:22, 15 July 2017
  • |Title=5th International Workshop on Society, Privacy and the Semantic Web Policy and Technology 5th International Workshop on Society, Privacy and the Semantic Web
    7 KB (901 words) - 11:13, 16 July 2017
  • Research in Information Security and Privacy (SRISP). The acceptance ratio of • Data Security and Privacy
    5 KB (626 words) - 12:02, 3 September 2017
  • * Security and Privacy * IT Policy and Business Management
    5 KB (589 words) - 11:46, 8 August 2017
  • |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)
    5 KB (640 words) - 13:34, 28 July 2017
  • |Title=IEEE PAC 2017 : The 1st IEEE Symposium on Privacy-Aware Computing |Field=privacy
    4 KB (532 words) - 13:24, 28 July 2017
  • * Web search and data mining under privacy constraints ...the double blind reviewing requirement. Additionally, the ACM has a strict policy against plagiarism and self-plagiarism. All prior work must be appropriatel
    8 KB (1,069 words) - 08:17, 6 February 2020
  • * Personal data and privacy ...uld present new and substantial theoretical, empirical, methodological, or policy-oriented contributions to research and/or practice. Full papers include an
    8 KB (1,023 words) - 19:05, 7 March 2020
  • *Internet economics and policy *Security and privacy aspects of network applications and protocols
    2 KB (290 words) - 11:16, 6 April 2020
  • * Documents and privacy * Secure document workflows, policy, and access, security for mobile and printing devices
    3 KB (368 words) - 07:27, 17 April 2020
  • * Security and privacy in mobile systems MobiSys will use a double-blind review policy during the initial paper review. Authors are instructed to not include thei
    5 KB (759 words) - 15:21, 18 June 2020
  • ...Policy Analysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies. === Technological Aspects of e-Governance & Privacy ===
    3 KB (314 words) - 11:52, 27 March 2020
  • * Security and privacy in mobile systems MobiSys uses a double-blind review policy during the initial paper review. Authors are instructed to not include thei
    5 KB (732 words) - 15:22, 18 June 2020
  • * Security and privacy in mobile systems ...affiliations and contact information of the authors. Beginning 2017, this policy is modified as follows: the identity of the reviews is not revealed to the
    6 KB (944 words) - 15:24, 18 June 2020
  • * Security and privacy in mobile systems MobiSys uses a double-blind review policy during the initial paper review. Authors are instructed to not include thei
    5 KB (721 words) - 10:07, 17 August 2023
  • ...Service open architecture (SOA); Profiling and service adaptation; Service privacy and security; Quality of service, service level agreement [QoS/SLA]; Servic ...y services in NGN and standard activities; NGN device instrumentation; NGN policy-based control; Next Generation Internet
    14 KB (1,770 words) - 14:56, 19 April 2020
  • ...bility, discovery of services and data in Cloud computing infrastructures; Privacy, security, ownership and reliability issues; Performance and QoS; Dynamic r Agent-based autonomous systems; Policy-driven self-awareness mechanisms and their applicability in autonomic syste
    16 KB (1,897 words) - 12:31, 18 May 2020
  • ...; Privacy and security; Trust and reputation; Access control; Policies and policy languages
    11 KB (1,390 words) - 12:35, 18 May 2020
  • Documents and privacy Secure document workflows, policy, and access, security for mobile and printing devices
    3 KB (361 words) - 14:48, 22 April 2020
  • ...to engineer agent and multi-agent systems that are secure and protect the privacy concerns of users? Submission policy: all papers should be original and not be submitted elsewhere. The review p
    8 KB (1,092 words) - 12:49, 22 April 2020
  • Documents and privacy Secure document workflows, policy, and access, security for mobile and printing devices
    3 KB (363 words) - 14:44, 22 April 2020
  • ...g data systems and applications. The conference adopts single-blind review policy. We expect to have a very high quality and exciting technical program at At 5. '''Ethics, Privacy and Trust in Big Data Systems'''
    9 KB (1,187 words) - 14:18, 27 May 2020
  • ...mergency and e-coaching on online communications; B2B and B2E cooperation; Privacy, identify, security on online communications; Individual anonymity, group t ...Counterfeit forensic; Identity management and access control; Security and privacy in location-based services
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...machine learning for cybersecurity; Behavioral biometrics authentication; Privacy by design; Anonymity of blockchain and cryptocurrencies; Threat categorizat USSAF: User safety, privacy, and protection over Internet
    17 KB (2,088 words) - 12:49, 14 June 2020
  • ...Centralized and distributed scheduling; Service differentiation; Security, Privacy, and Trust; Protocol interference models; Single-channel multihop/multichan ...cast, addressing, identity/; Mobility and hand-off ; Properties /security, privacy, performance, robustness, real-time, etc./; Control and management in vehic
    13 KB (1,636 words) - 11:51, 10 July 2020
  • * reasoning about security and privacy ...issions are not anonymous: LICS 2019 will operate a single-blind reviewing policy. (There is a current intention use double-blind reviewing and anonymous sub
    4 KB (525 words) - 11:27, 27 August 2020
  • ...ormance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality of Service) and QoE (Quality of Experience); Stand ...of things on the Internet; Crowd-sourcing and things; Trust, security and privacy in Internet of Things; Lightweight implementations of cryptographic stacks;
    13 KB (1,550 words) - 02:20, 10 July 2020
  • Mobility and QoS management; Billing technologies and tools; Policy Based Management in wireless LANS and MANs; Wireless and Mobile Network Pla Security and robustness in wireless networks; Privacy, Authentication Authorization and Accounting (AAA); Encryption and Cryptogr
    11 KB (1,335 words) - 02:28, 10 July 2020
  • ...ic and private organizations; Cybersecurity risks; Smart home security and privacy; Security awareness; Digital forensics; Large e-Commerce; Digital crowdfund ...Consumer-level neuro-devices and IS; IS Pedagogy 2.0; Information security policy compliance; Visualizing mental learning processes; Task-adaptive IS; Enterp
    18 KB (2,036 words) - 02:36, 10 July 2020
  • ...encies; Plug&play software; Adaptive software; Context-sensitive software; Policy-driven software design; Software rejuvenation; Feature interaction detectio Software security, privacy, safeness
    13 KB (1,573 words) - 12:00, 10 July 2020
  • * Government Policy and Regulation * Commercial Policy, Protection, Promotion, Trade Negotiations
    9 KB (896 words) - 16:31, 6 August 2020
  • # E-governance, policy and law # Security and privacy issues
    3 KB (327 words) - 10:00, 25 August 2020
  • ...um on Security and Privacy 2018]] ||[[:39th IEEE Symposium on Security and Privacy]] ||43 ...um on Security and Privacy 2019]] ||[[:40th IEEE Symposium on Security and Privacy]] ||43
    24 KB (2,633 words) - 18:53, 15 October 2020
  • protection, integrity, privacy, and pseudonymisation mechanisms; Big Big data innovation spaces; Big Data skills development; Policy,
    9 KB (1,239 words) - 14:37, 29 December 2020

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)