Search results

Jump to: navigation, search
  • ...networks to exist; within groups and between groups there are problems of privacy, identity, anonymity, trust, and confidentiality. Additionally, conflict, d ...utomation of contracting and contract monitoring on the web, protection of privacy in location-based computing, etc.
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ..., controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. ...elated Security and Privacy: Trust-related secure architecture, framework, policy, intrusion detection/awareness, protocols, etc.
    9 KB (1,216 words) - 17:32, 14 October 2008
  • * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques * Policy & Regulatory Issues: Spectral management, privacy issues, co-existence of RFID systems, social implications of RFID technolog
    3 KB (431 words) - 17:48, 14 October 2008
  • • Wireless network security and privacy ...els in the above mentioned topical areas or others related to business and policy-related issues and opportunities for the wireless communications industry.
    6 KB (731 words) - 10:33, 14 August 2023
  • ...ent intentionally seeks scientists, engineers, educators, industry people, policy makers, decision makers, and others who have insight, vision, and understan * Trust, reputation, security, and privacy in MBC
    5 KB (647 words) - 22:05, 14 October 2008
  • ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random ...r to July 2009, will not be considered for acceptance at STOC 2009. SIGACT policy does not allow simultaneous submissions of the same (or essentially the sam
    6 KB (869 words) - 20:22, 22 February 2009
  • * › Wireless Information Policy, Risk Assessment and Management Area 4: Wireless Information Policy, Risk Assessment and Management
    9 KB (1,219 words) - 20:05, 14 October 2008
  • ...momentum towards research in finding viable solutions to the security and privacy challenges faced by the current and future collaborative systems and infras ...l issues and practical implementations/experiences related to security and privacy solutions for collaborative systems. Topics of interest include, but are no
    4 KB (520 words) - 20:05, 14 October 2008
  • Privacy, Trust, and Security is Distributed Systems Distributed data management, Policy-Based management
    2 KB (208 words) - 20:05, 14 October 2008
  • - eHealth Policy and Practice - Patient Privacy and Confidentiality
    6 KB (780 words) - 20:06, 14 October 2008
  • - Security and Privacy: cryptography; access control; security in domain-specific applications; privacy and trust
    9 KB (1,193 words) - 22:53, 14 October 2008
  • reliability, integrity, privacy, and security issues are still being investigated. For example, in data warehousing applications, privacy
    7 KB (908 words) - 23:10, 14 October 2008
  • • Federation and policy management for •Trust, security, dependability, privacy, QoS and
    5 KB (549 words) - 17:15, 5 July 2020
  • | Acronym = Policy 2008 | Title = IEEE Policy Workshop 2008
    5 KB (667 words) - 23:13, 14 October 2008
  • * Privacy-Preserving Web Services Technologies Review Policy
    8 KB (1,158 words) - 23:14, 14 October 2008
  • * Policy, regulation and legislation * Values in multi-agent systems, including privacy, safety, security and transparency
    6 KB (659 words) - 17:41, 11 February 2021
  • ...lex, involving difficult social and policy issues such as those related to privacy and security ...nologies, information networking, human-computer interaction, security and privacy.
    8 KB (1,003 words) - 23:15, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust ...provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable inn
    6 KB (736 words) - 23:20, 14 October 2008
  • Privacy Security Policy and Procedures
    4 KB (465 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security ...nference is to share research solutions to problems of Trust, Security and Privacy and to identify new issues and directions for future research and developme
    4 KB (565 words) - 23:20, 14 October 2008
  • | Title = IEEE Symposium on Security and Privacy ...m for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
    2 KB (262 words) - 23:20, 14 October 2008
  • Review Policy: "IEEE Policy and professional ethics requires that referees treat the contents of papers
    18 KB (2,352 words) - 23:23, 14 October 2008
  • ...us access technologies under secured (still to be improved) and guaranteed privacy. The family of the mobile devices expand dramatically, allowing a user to h ...obile learning is favoured by many national and international projects and policy synchronization boards.
    6 KB (765 words) - 23:26, 14 October 2008
  • *Internet economics and policy *Security and privacy aspects of network applications and protocols
    4 KB (514 words) - 12:03, 6 April 2020
  • E-democracy, e-policy, and governance Legal and social ontologies Privacy and copyright in collaborative environments and social networks
    8 KB (1,075 words) - 23:52, 14 October 2008
  • ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random ...r to July 2008, will not be considered for acceptance at STOC 2008. SIGACT policy does not allow simultaneous submissions of the same (or essentially the sam
    5 KB (766 words) - 23:37, 14 October 2008
  • Issues of privacy of communication, data security, and Double Submission Policy
    9 KB (1,215 words) - 23:38, 14 October 2008
  • * Policy driven management for RTSOAA * Security and privacy for RTSOAA based CPS
    7 KB (922 words) - 00:58, 9 January 2009
  • ** Privacy and security ** Security and privacy
    11 KB (1,366 words) - 16:44, 14 January 2009
  • * Security, Privacy, Encryption, and Digital Rights, including o Privacy-enhancing technologies
    9 KB (1,221 words) - 12:58, 18 January 2009
  • - Privacy ...by ana.sofia@informatics-conf.org | Print / PDF version | Read our Privacy Policy.
    5 KB (633 words) - 12:58, 18 January 2009
  • and Public Policy in the Age of e-Euphoria. Conference main theme will be supported by systems; information assurance, security, and public policy. Doctoral students are
    16 KB (2,178 words) - 12:59, 18 January 2009
  • - temporal aspects of agent- and policy-based systems - privacy in temporal and spatio-temporal data
    6 KB (872 words) - 13:00, 18 January 2009
  • * Exposition of legal, business and technology policy issues relevant to multimedia security. * Multimedia network protection, privacy and security.
    3 KB (303 words) - 17:06, 24 February 2016
  • o Policy between primary user and secondary user * Wireless security and privacy
    14 KB (1,518 words) - 13:01, 18 January 2009
  • 17) Security & Privacy in Pervasive Computing environments - SPPC 09 Conference policy
    10 KB (1,321 words) - 13:01, 18 January 2009
  • * Anonymity, user privacy, and location privacy in UE * Surveillance and Privacy-enhancing technologies in UE
    6 KB (793 words) - 15:12, 1 October 2020
  • ...llaborative technologies, virtual worlds and tele-presence raise issues of privacy, management, compliance, governance, and risk. ...s by exposing problems, and uncovering potential problems, in the areas of privacy, compliance, governance, and risk. Each of these issues creates situations
    4 KB (557 words) - 16:33, 27 February 2009
  • managers, and policy makers interested in computer software and + Middleware solutions for Security, Privacy and Trust
    6 KB (800 words) - 22:11, 27 February 2009
  • ...ves. In this context analysing concepts like Trust, Reliability, Security, Privacy and Risk would help the users to make informed judgements of what their lev • Security and Privacy
    4 KB (600 words) - 17:07, 27 February 2009
  • · Privacy and Anonymity · Security Policy and Enforcement Issues
    4 KB (485 words) - 17:07, 27 February 2009
  • ...configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing environment. * Security policy deployment
    3 KB (480 words) - 17:08, 27 February 2009
  • * Privacy Protection * Security Policy
    4 KB (530 words) - 15:02, 27 December 2015
  • USSAF: User safety, privacy, and protection over Internet ...smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instan
    14 KB (1,651 words) - 15:56, 15 February 2017
  • - e-Privacy - e-Health Policy and Practice
    4 KB (507 words) - 22:37, 18 November 2009
  • * Government, and corporate Internet security policy * Trust, privacy, and data security
    5 KB (607 words) - 18:01, 3 December 2009
  • |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust
    4 KB (484 words) - 14:20, 14 December 2009
  • ...uality issues in such systems; information assurance, security, and public policy. Doctoral students are encouraged to propose papers on ongoing research. * Trust and privacy
    10 KB (1,270 words) - 17:12, 20 April 2010
  • • Information sharing policy and governance<br> • Privacy, security, and civil liberties issues<br>
    4 KB (429 words) - 08:55, 1 August 2019
  • *Information sharing policy and governance<br> *Privacy, security, and civil liberties issues<br>
    9 KB (1,092 words) - 09:35, 1 August 2019

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)