Search results

From ConfIDent
Results 21 – 40 of 112
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • knowledge sources -Semantic technology and privacy by design -Semantic technology and privacy impact assessments -Privacy challenges arising from Linked Open
    7 KB (1,014 words) - 14:19, 19 October 2022
  • discrimination policy. For full details, please visit this site: https://www.acm.org/special-interest-groups/volunteer-resources/officers-manual/policy-agains
    36 KB (5,252 words) - 11:51, 4 August 2023
  • development. * Issues of technology policy and public policy in multimedia security, for example DRM, copyright, privacy, interoperability and accessibility
    3 KB (388 words) - 15:28, 19 October 2022
  • Digital Ecosystems • Privacy Preservation and Policy Administration for Dependability in Digital Ecosystems • Privacy Assurance and Privacy Risk Assessment
    4 KB (691 words) - 15:29, 19 October 2022
  • trustworthy infrastructures Trust, Security and Privacy in embedded systems Trust, Security and Privacy in social networks Trusted mobile platforms and
    4 KB (575 words) - 15:30, 19 October 2022
  • 2017-10-21 → 2017-10-25 Semantic Web 5th International Workshop on Society, Privacy and the Semantic Web Policy and Technology 2017-10-21 → 2017-10-25 Semantic Web Workshop
    104 bytes (2,266 words) - 11:56, 21 October 2022
  • Services Computing * Privacy, Traceability, and Anonymity * Trust and Reputation in Self-Organizing Environments * Anonymity and Privacy vs. Accountability
    6 KB (853 words) - 15:28, 19 October 2022
  • Security and privacy in GIS/spatial data Security and privacy in healthcare Security and privacy in the Internet of Things Security policies for databases
    6 KB (995 words) - 10:17, 15 December 2022
  • Detection using Big Data Analytics Privacy Preserving Big Data Collection/Analytics HCI Challenges for Big Data Security & Privacy Trust management in IoT and
    9 KB (1,351 words) - 06:28, 7 August 2023
  • Measurements of human behavior and security Privacy-enhancing technologies and anonymity Usable security and privacy Language-based security Hardware security
    3 KB (459 words) - 14:23, 19 October 2022
  • 2022-09-19 35th IAC IAA Symposium on Space Policy, Regulations and Economics 2022 IAC IAA Symposium on Space Policy, Regulation and Economics 2022-09-19 TransAI
    372 bytes (12 words) - 11:12, 3 November 2022
  • automatically configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing
    4 KB (575 words) - 15:27, 19 October 2022
  • trustworthy infrastructures ● Trust, Security and Privacy in embedded systems ● Trust, Security and Privacy in social networks ● Trusted mobile platforms and
    5 KB (800 words) - 14:24, 19 October 2022
  • Coding, modulation and medium access schemes * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques * System Tools: Tools for the design
    4 KB (555 words) - 15:27, 19 October 2022
  • 2022-09-19 35th IAC IAA Symposium on Space Policy, Regulations and Economics 2022 IAC IAA Symposium on Space Policy, Regulation and Economics 2022-09-19 TransAI
    378 bytes (12 words) - 11:05, 3 November 2022
  • Management Data Security Application Security Security Policy Authentication & Authorisation Privacy Software Protection Mobile Security Network Security
    2 KB (322 words) - 14:44, 19 October 2022
  • Middleware Existing paradigms revisited: object, component, aspect, agent Privacy, Trust, and Security is Distributed Systems Context Awareness and Self-Adaptation
    2 KB (296 words) - 15:28, 19 October 2022
  • Brokerage * Government Policy and Regulation * Corporate Finance and Governance * Capital Budgeting, Investment Policy * Financing Policy, Capital and Ownership
    10 KB (1,011 words) - 14:03, 19 October 2022
  • Digital payment systems o Authentication o Privacy-enhancing technologies o Economics of information security and privacy * Social factors, including o Usability
    9 KB (1,409 words) - 09:33, 4 August 2023
  • under the aegis of the Society for Research in Information Security and Privacy (SRISP). The acceptance ratio of the first twelve conferences has averaged
    5 KB (738 words) - 14:05, 19 October 2022

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)

Cookies help us deliver our services. By using our services, you agree to our use of cookies.