Search results
Create the page "Privacy policy" on this wiki! See also the search results found.
- ...networks to exist; within groups and between groups there are problems of privacy, identity, anonymity, trust, and confidentiality. Additionally, conflict, d ...utomation of contracting and contract monitoring on the web, protection of privacy in location-based computing, etc.18 KB (2,408 words) - 02:37, 16 December 2008
- ..., controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. ...elated Security and Privacy: Trust-related secure architecture, framework, policy, intrusion detection/awareness, protocols, etc.9 KB (1,216 words) - 17:32, 14 October 2008
- * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques * Policy & Regulatory Issues: Spectral management, privacy issues, co-existence of RFID systems, social implications of RFID technolog3 KB (431 words) - 17:48, 14 October 2008
- • Wireless network security and privacy ...els in the above mentioned topical areas or others related to business and policy-related issues and opportunities for the wireless communications industry.6 KB (731 words) - 10:33, 14 August 2023
- ...ent intentionally seeks scientists, engineers, educators, industry people, policy makers, decision makers, and others who have insight, vision, and understan * Trust, reputation, security, and privacy in MBC5 KB (647 words) - 22:05, 14 October 2008
- ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random ...r to July 2009, will not be considered for acceptance at STOC 2009. SIGACT policy does not allow simultaneous submissions of the same (or essentially the sam6 KB (869 words) - 20:22, 22 February 2009
- * › Wireless Information Policy, Risk Assessment and Management Area 4: Wireless Information Policy, Risk Assessment and Management9 KB (1,219 words) - 20:05, 14 October 2008
- ...momentum towards research in finding viable solutions to the security and privacy challenges faced by the current and future collaborative systems and infras ...l issues and practical implementations/experiences related to security and privacy solutions for collaborative systems. Topics of interest include, but are no4 KB (520 words) - 20:05, 14 October 2008
- Privacy, Trust, and Security is Distributed Systems Distributed data management, Policy-Based management2 KB (208 words) - 20:05, 14 October 2008
- - eHealth Policy and Practice - Patient Privacy and Confidentiality6 KB (780 words) - 20:06, 14 October 2008
- - Security and Privacy: cryptography; access control; security in domain-specific applications; privacy and trust9 KB (1,193 words) - 22:53, 14 October 2008
- reliability, integrity, privacy, and security issues are still being investigated. For example, in data warehousing applications, privacy7 KB (908 words) - 23:10, 14 October 2008
- • Federation and policy management for •Trust, security, dependability, privacy, QoS and5 KB (549 words) - 17:15, 5 July 2020
- | Acronym = Policy 2008 | Title = IEEE Policy Workshop 20085 KB (667 words) - 23:13, 14 October 2008
- * Privacy-Preserving Web Services Technologies Review Policy8 KB (1,158 words) - 23:14, 14 October 2008
- * Policy, regulation and legislation * Values in multi-agent systems, including privacy, safety, security and transparency6 KB (659 words) - 17:41, 11 February 2021
- ...lex, involving difficult social and policy issues such as those related to privacy and security ...nologies, information networking, human-computer interaction, security and privacy.8 KB (1,003 words) - 23:15, 14 October 2008
- | Title = Sixth Annual Conference on Privacy, Security and Trust ...provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable inn6 KB (736 words) - 23:20, 14 October 2008
- Privacy Security Policy and Procedures4 KB (465 words) - 23:20, 14 October 2008
- | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security ...nference is to share research solutions to problems of Trust, Security and Privacy and to identify new issues and directions for future research and developme4 KB (565 words) - 23:20, 14 October 2008
- | Title = IEEE Symposium on Security and Privacy ...m for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.2 KB (262 words) - 23:20, 14 October 2008
- Review Policy: "IEEE Policy and professional ethics requires that referees treat the contents of papers18 KB (2,352 words) - 23:23, 14 October 2008
- ...us access technologies under secured (still to be improved) and guaranteed privacy. The family of the mobile devices expand dramatically, allowing a user to h ...obile learning is favoured by many national and international projects and policy synchronization boards.6 KB (765 words) - 23:26, 14 October 2008
- *Internet economics and policy *Security and privacy aspects of network applications and protocols4 KB (514 words) - 12:03, 6 April 2020
- E-democracy, e-policy, and governance Legal and social ontologies Privacy and copyright in collaborative environments and social networks8 KB (1,075 words) - 23:52, 14 October 2008
- ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random ...r to July 2008, will not be considered for acceptance at STOC 2008. SIGACT policy does not allow simultaneous submissions of the same (or essentially the sam5 KB (766 words) - 23:37, 14 October 2008
- Issues of privacy of communication, data security, and Double Submission Policy9 KB (1,215 words) - 23:38, 14 October 2008
- * Policy driven management for RTSOAA * Security and privacy for RTSOAA based CPS7 KB (922 words) - 00:58, 9 January 2009
- ** Privacy and security ** Security and privacy11 KB (1,366 words) - 16:44, 14 January 2009
- * Security, Privacy, Encryption, and Digital Rights, including o Privacy-enhancing technologies9 KB (1,221 words) - 12:58, 18 January 2009
- - Privacy ...by ana.sofia@informatics-conf.org | Print / PDF version | Read our Privacy Policy.5 KB (633 words) - 12:58, 18 January 2009
- and Public Policy in the Age of e-Euphoria. Conference main theme will be supported by systems; information assurance, security, and public policy. Doctoral students are16 KB (2,178 words) - 12:59, 18 January 2009
- - temporal aspects of agent- and policy-based systems - privacy in temporal and spatio-temporal data6 KB (872 words) - 13:00, 18 January 2009
- * Exposition of legal, business and technology policy issues relevant to multimedia security. * Multimedia network protection, privacy and security.3 KB (303 words) - 17:06, 24 February 2016
- o Policy between primary user and secondary user * Wireless security and privacy14 KB (1,518 words) - 13:01, 18 January 2009
- 17) Security & Privacy in Pervasive Computing environments - SPPC 09 Conference policy10 KB (1,321 words) - 13:01, 18 January 2009
- * Anonymity, user privacy, and location privacy in UE * Surveillance and Privacy-enhancing technologies in UE6 KB (793 words) - 15:12, 1 October 2020
- ...llaborative technologies, virtual worlds and tele-presence raise issues of privacy, management, compliance, governance, and risk. ...s by exposing problems, and uncovering potential problems, in the areas of privacy, compliance, governance, and risk. Each of these issues creates situations4 KB (557 words) - 16:33, 27 February 2009
- managers, and policy makers interested in computer software and + Middleware solutions for Security, Privacy and Trust6 KB (800 words) - 22:11, 27 February 2009
- ...ves. In this context analysing concepts like Trust, Reliability, Security, Privacy and Risk would help the users to make informed judgements of what their lev • Security and Privacy4 KB (600 words) - 17:07, 27 February 2009
- · Privacy and Anonymity · Security Policy and Enforcement Issues4 KB (485 words) - 17:07, 27 February 2009
- ...configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing environment. * Security policy deployment3 KB (480 words) - 17:08, 27 February 2009
- * Privacy Protection * Security Policy4 KB (530 words) - 15:02, 27 December 2015
- USSAF: User safety, privacy, and protection over Internet ...smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instan14 KB (1,651 words) - 15:56, 15 February 2017
- - e-Privacy - e-Health Policy and Practice4 KB (507 words) - 22:37, 18 November 2009
- * Government, and corporate Internet security policy * Trust, privacy, and data security5 KB (607 words) - 18:01, 3 December 2009
- |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust4 KB (484 words) - 14:20, 14 December 2009
- ...uality issues in such systems; information assurance, security, and public policy. Doctoral students are encouraged to propose papers on ongoing research. * Trust and privacy10 KB (1,270 words) - 17:12, 20 April 2010
- • Information sharing policy and governance<br> • Privacy, security, and civil liberties issues<br>4 KB (429 words) - 08:55, 1 August 2019
- *Information sharing policy and governance<br> *Privacy, security, and civil liberties issues<br>9 KB (1,092 words) - 09:35, 1 August 2019
- - Anonymity, user privacy, and location privacy in UE - Surveillance and Privacy-enhancing technologies in UE3 KB (498 words) - 02:52, 22 December 2012
- * Security Policy * Privacy2 KB (217 words) - 16:50, 19 November 2020
- * Foundations of Privacy, Trust and Reputation in Network According to the ICALP policy, for every accepted paper it is required that at least one author attends t4 KB (602 words) - 06:44, 26 August 2020
- ...grammers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 29th USENIX Security Symposium will b ...ns are solicited in all areas relating to systems research in security and privacy, including but not limited to:3 KB (343 words) - 16:31, 6 May 2020
- - e-Privacy - e-Health Policy and Practice6 KB (732 words) - 05:52, 5 December 2010
- * Security Policy * Privacy2 KB (217 words) - 16:57, 27 December 2015
- Trust, Security and Privacy in embedded systems Trust, Security and Privacy in social networks4 KB (451 words) - 12:27, 30 November 2011
- - e-Privacy - e-Health Policy and Practice5 KB (595 words) - 05:03, 15 January 2012
- Standardization (IEEE 802.17, Policy Models, Etc.); IEEE 802.11 engineering; Telecommunications protocol enginee ...nagement; Measurement, monitoring and supervision techniques; Security and privacy in optical networks; Optical access networks designs and protocols; High sp13 KB (1,580 words) - 19:35, 18 February 2021
- *Information sharing policy and governance<br> *Privacy, security, and civil liberties issues<br>5 KB (575 words) - 10:16, 1 August 2019
- ...ural science, linguistics, security, criminal intelligence, health, public policy, to come together to share and present their innovative work in the social • Legal and public policy issues6 KB (728 words) - 01:01, 25 August 2012
- ● Trust, Security and Privacy in embedded systems ● Trust, Security and Privacy in social networks5 KB (677 words) - 15:19, 19 December 2012
- - e-Privacy - e-Health Policy and Practice4 KB (535 words) - 14:38, 17 January 2013
- - e-Privacy - e-Health Policy and Practice5 KB (641 words) - 22:32, 29 July 2016
- [PrivOn] Society, Privacy and the Semantic Web - Policy and Technology10 KB (1,424 words) - 09:54, 6 March 2020
- ...s, Information Technology Audit, Steganalysis, Data Remanence, Information Privacy, Usable Security, etc... ...red to go through with the various instructions available under conference policy and manuscript preparation and submission link at:2 KB (323 words) - 13:36, 6 March 2017
- |Title=12th International Workshop on Data Privacy Management |Field=Data Privacy7 KB (887 words) - 15:22, 15 July 2017
- |Title=5th International Workshop on Society, Privacy and the Semantic Web Policy and Technology 5th International Workshop on Society, Privacy and the Semantic Web7 KB (901 words) - 11:13, 16 July 2017
- Research in Information Security and Privacy (SRISP). The acceptance ratio of • Data Security and Privacy5 KB (626 words) - 12:02, 3 September 2017
- * Security and Privacy * IT Policy and Business Management5 KB (589 words) - 11:46, 8 August 2017
- |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)5 KB (640 words) - 13:34, 28 July 2017
- |Title=IEEE PAC 2017 : The 1st IEEE Symposium on Privacy-Aware Computing |Field=privacy4 KB (532 words) - 13:24, 28 July 2017
- * Web search and data mining under privacy constraints ...the double blind reviewing requirement. Additionally, the ACM has a strict policy against plagiarism and self-plagiarism. All prior work must be appropriatel8 KB (1,069 words) - 08:17, 6 February 2020
- * Personal data and privacy ...uld present new and substantial theoretical, empirical, methodological, or policy-oriented contributions to research and/or practice. Full papers include an8 KB (1,023 words) - 19:05, 7 March 2020
- *Internet economics and policy *Security and privacy aspects of network applications and protocols2 KB (290 words) - 11:16, 6 April 2020
- * Documents and privacy * Secure document workflows, policy, and access, security for mobile and printing devices3 KB (368 words) - 07:27, 17 April 2020
- * Security and privacy in mobile systems MobiSys will use a double-blind review policy during the initial paper review. Authors are instructed to not include thei5 KB (759 words) - 15:21, 18 June 2020
- ...Policy Analysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies. === Technological Aspects of e-Governance & Privacy ===3 KB (314 words) - 11:52, 27 March 2020
- * Security and privacy in mobile systems MobiSys uses a double-blind review policy during the initial paper review. Authors are instructed to not include thei5 KB (732 words) - 15:22, 18 June 2020
- * Security and privacy in mobile systems ...affiliations and contact information of the authors. Beginning 2017, this policy is modified as follows: the identity of the reviews is not revealed to the6 KB (944 words) - 15:24, 18 June 2020
- * Security and privacy in mobile systems MobiSys uses a double-blind review policy during the initial paper review. Authors are instructed to not include thei5 KB (721 words) - 10:07, 17 August 2023
- ...Service open architecture (SOA); Profiling and service adaptation; Service privacy and security; Quality of service, service level agreement [QoS/SLA]; Servic ...y services in NGN and standard activities; NGN device instrumentation; NGN policy-based control; Next Generation Internet14 KB (1,770 words) - 14:56, 19 April 2020
- ...bility, discovery of services and data in Cloud computing infrastructures; Privacy, security, ownership and reliability issues; Performance and QoS; Dynamic r Agent-based autonomous systems; Policy-driven self-awareness mechanisms and their applicability in autonomic syste16 KB (1,897 words) - 12:31, 18 May 2020
- ...; Privacy and security; Trust and reputation; Access control; Policies and policy languages11 KB (1,390 words) - 12:35, 18 May 2020
- Documents and privacy Secure document workflows, policy, and access, security for mobile and printing devices3 KB (361 words) - 14:48, 22 April 2020
- ...to engineer agent and multi-agent systems that are secure and protect the privacy concerns of users? Submission policy: all papers should be original and not be submitted elsewhere. The review p8 KB (1,092 words) - 12:49, 22 April 2020
- Documents and privacy Secure document workflows, policy, and access, security for mobile and printing devices3 KB (363 words) - 14:44, 22 April 2020
- ...g data systems and applications. The conference adopts single-blind review policy. We expect to have a very high quality and exciting technical program at At 5. '''Ethics, Privacy and Trust in Big Data Systems'''9 KB (1,187 words) - 14:18, 27 May 2020
- ...mergency and e-coaching on online communications; B2B and B2E cooperation; Privacy, identify, security on online communications; Individual anonymity, group t ...Counterfeit forensic; Identity management and access control; Security and privacy in location-based services14 KB (1,804 words) - 13:49, 5 June 2020
- ...machine learning for cybersecurity; Behavioral biometrics authentication; Privacy by design; Anonymity of blockchain and cryptocurrencies; Threat categorizat USSAF: User safety, privacy, and protection over Internet17 KB (2,088 words) - 12:49, 14 June 2020
- ...Centralized and distributed scheduling; Service differentiation; Security, Privacy, and Trust; Protocol interference models; Single-channel multihop/multichan ...cast, addressing, identity/; Mobility and hand-off ; Properties /security, privacy, performance, robustness, real-time, etc./; Control and management in vehic13 KB (1,636 words) - 11:51, 10 July 2020
- * reasoning about security and privacy ...issions are not anonymous: LICS 2019 will operate a single-blind reviewing policy. (There is a current intention use double-blind reviewing and anonymous sub4 KB (525 words) - 11:27, 27 August 2020
- ...ormance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality of Service) and QoE (Quality of Experience); Stand ...of things on the Internet; Crowd-sourcing and things; Trust, security and privacy in Internet of Things; Lightweight implementations of cryptographic stacks;13 KB (1,550 words) - 02:20, 10 July 2020
- Mobility and QoS management; Billing technologies and tools; Policy Based Management in wireless LANS and MANs; Wireless and Mobile Network Pla Security and robustness in wireless networks; Privacy, Authentication Authorization and Accounting (AAA); Encryption and Cryptogr11 KB (1,335 words) - 02:28, 10 July 2020
- ...ic and private organizations; Cybersecurity risks; Smart home security and privacy; Security awareness; Digital forensics; Large e-Commerce; Digital crowdfund ...Consumer-level neuro-devices and IS; IS Pedagogy 2.0; Information security policy compliance; Visualizing mental learning processes; Task-adaptive IS; Enterp18 KB (2,036 words) - 02:36, 10 July 2020
- ...encies; Plug&play software; Adaptive software; Context-sensitive software; Policy-driven software design; Software rejuvenation; Feature interaction detectio Software security, privacy, safeness13 KB (1,573 words) - 12:00, 10 July 2020
- * Government Policy and Regulation * Commercial Policy, Protection, Promotion, Trade Negotiations9 KB (896 words) - 16:31, 6 August 2020
- # E-governance, policy and law # Security and privacy issues3 KB (327 words) - 10:00, 25 August 2020
- ...um on Security and Privacy 2018]] ||[[:39th IEEE Symposium on Security and Privacy]] ||43 ...um on Security and Privacy 2019]] ||[[:40th IEEE Symposium on Security and Privacy]] ||4324 KB (2,633 words) - 18:53, 15 October 2020
- protection, integrity, privacy, and pseudonymisation mechanisms; Big Big data innovation spaces; Big Data skills development; Policy,9 KB (1,239 words) - 14:37, 29 December 2020