Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 17 von 221

Details

Autor(en) / Beteiligte
Titel
2015 13th Annual Conference on Privacy, Security and Trust (PST)
Ort / Verlag
Piscataway, NJ : IEEE,
Erscheinungsjahr
2015
Beschreibungen/Notizen
  • [Front cover] -- [Copyright notice] -- Welcome message from the general chair -- Organizing Committee -- Table of contents -- InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol -- Recommendation of categories in an agents world: The role of (not) local communicative environments -- Zipf distribution model for quantifying risk of re-identification from trajectory data -- Who manages the manager? Identity management and user ownership in the age of data -- Disclosure risk assessment via record linkage by a maximum-knowledge attacker -- Privacy preserving business process matching -- Privacy-preserving conditional random selection -- Laplace noise generation for two-party computational differential privacy.
  • PST2015 provides a forum for researchers world wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation Privacy concerns the operational policies, procedures and regulations implemented within an information system to control for the unauthorized use of, access to, or release of personal information held in any format Security addresses the various components of an information system that safeguard the data and associated infrastructure from unauthorized activity Trust is a fundamental human behavior It is necessary for people to function in social groups, and it forms the foundation for many of our organizations and relationships.
  • Description based on publisher supplied metadata and other sources.
Sprache
Identifikatoren
ISBN: 1-4673-7828-3
Titel-ID: 9925164732006463
Format
1 online resource
Schlagworte
Computer security