Search results

From ConfIDent
Results 1 – 112 of 112
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • Datenschutz hat einen hohen Stellenwert für die Technische Informationsbibliothek (TIB). Eine Nutzung der Dienstleistungen der TIB ist grundsätzlich ohne
    9 KB (963 words) - 11:57, 12 September 2023
  • Cryptanalysis Privacy Policy Analysis Query Execution over Privacy-Sensitive Data Privacy Preserving Data Mining Privacy for IntegrityBased Computing Privacy Monitoring
    7 KB (1,038 words) - 13:08, 19 October 2022
  • mobile computing Privacy-aware information retrieval Privacy-aware computation outsourcing Privacy-preserving data collection Privacy-aware data mining
    4 KB (672 words) - 14:08, 19 October 2022
  • incompatible formats, and erroneous data Privacy and security policies and social impact of data mining Privacy preserving data integration Access control
    7 KB (1,004 words) - 14:45, 19 October 2022
  • es by ana.sofia@informatics-conf.org | Print / PDF version | Read our Privacy Policy. This CfP was obtained from WikiCFP
    5 KB (685 words) - 15:23, 19 October 2022
  • adaptive policy systems * Database policies * Policy applications in on-demand, utility based computing * Resource virtualization and policy-based collaboration
    5 KB (786 words) - 15:28, 19 October 2022
  • Technologies * Privacy-Preserving Computing * Privacy Policies and Laws * Economics of Privacy * Privacy Theory and Engineering * Natural Disasters and
    2 KB (307 words) - 20:43, 22 September 2022
  • digital media licenses * authorization * access control * security policies * privacy policies * business processes * regulatory compliance We welcome both theoretical
    5 KB (690 words) - 14:45, 19 October 2022
  • Non-Repudiation of Data § Identity Management and Mapping § Privacy in Advanced Database Applications § Privacy Preserving Querying and Mining This CfP was obtained
    3 KB (403 words) - 15:28, 19 October 2022
  • and privacy for the Internet of Things Security and privacy metrics Security and privacy policies Security architectures Usable security and privacy Trustworthy
    4 KB (510 words) - 14:18, 19 October 2022
  • otherwise noted. <a href="/index.php/ConfIDent:Privacy_policy" title="ConfIDent:Privacy policy">Privacy policy</a> <a href="/index.php/ConfIDent:About" ti
    29 KB (2,337 words) - 13:00, 19 October 2022
  • ComputingPlainsPlanetary SciencesPlanningPlanning ResearchPlasmonicsPlatformPoetryPoliciesPolicyPolicy AdvocacyPolitical SciencePoliticsPollution ControlPolyhedral ModelPop
    305 bytes (1,165 words) - 16:17, 2 February 2023
  • otherwise noted. <a href="/index.php/ConfIDent:Privacy_policy" title="ConfIDent:Privacy policy">Privacy policy</a> <a href="/index.php/ConfIDent:About" ti
    44 KB (2,871 words) - 14:22, 19 October 2022
  • 2020 Security and Privacy for IoT: IoT security protocols and architectures Anonymization techniques Trust and identity management Privacy data protection
    6 KB (888 words) - 14:18, 19 October 2022
  • otherwise noted. <a href="/index.php/ConfIDent:Privacy_policy" title="ConfIDent:Privacy policy">Privacy policy</a> <a href="/index.php/ConfIDent:About" ti
    29 KB (2,357 words) - 15:21, 19 October 2022
  • Rights Management Systems; Security Policy Analysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies. Networking
    3 KB (468 words) - 06:52, 21 November 2022
  • Rights Management Systems; Security Policy Analysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies. Networking
    3 KB (419 words) - 15:47, 15 December 2022
  • Adaptive security policy management * Security, trust and privacy for service oriented architectures * Mobile security * Anonymity and privacy vs. accountability
    4 KB (662 words) - 15:23, 19 October 2022
  • latest work in privacy, security and trust and to show how this research can be used to enable innovation. This year’s theme is “Privacy, Security and Trust
    4 KB (596 words) - 14:18, 19 October 2022
  • Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing
    2 KB (369 words) - 15:30, 19 October 2022
  • knowledge sources -Semantic technology and privacy by design -Semantic technology and privacy impact assessments -Privacy challenges arising from Linked Open
    7 KB (1,014 words) - 14:19, 19 October 2022
  • discrimination policy. For full details, please visit this site: https://www.acm.org/special-interest-groups/volunteer-resources/officers-manual/policy-agains
    36 KB (5,252 words) - 11:51, 4 August 2023
  • development. * Issues of technology policy and public policy in multimedia security, for example DRM, copyright, privacy, interoperability and accessibility
    3 KB (388 words) - 15:28, 19 October 2022
  • Digital Ecosystems • Privacy Preservation and Policy Administration for Dependability in Digital Ecosystems • Privacy Assurance and Privacy Risk Assessment
    4 KB (691 words) - 15:29, 19 October 2022
  • trustworthy infrastructures Trust, Security and Privacy in embedded systems Trust, Security and Privacy in social networks Trusted mobile platforms and
    4 KB (575 words) - 15:30, 19 October 2022
  • 2017-10-21 → 2017-10-25 Semantic Web 5th International Workshop on Society, Privacy and the Semantic Web Policy and Technology 2017-10-21 → 2017-10-25 Semantic Web Workshop
    104 bytes (2,266 words) - 11:56, 21 October 2022
  • Services Computing * Privacy, Traceability, and Anonymity * Trust and Reputation in Self-Organizing Environments * Anonymity and Privacy vs. Accountability
    6 KB (853 words) - 15:28, 19 October 2022
  • Security and privacy in GIS/spatial data Security and privacy in healthcare Security and privacy in the Internet of Things Security policies for databases
    6 KB (995 words) - 10:17, 15 December 2022
  • Detection using Big Data Analytics Privacy Preserving Big Data Collection/Analytics HCI Challenges for Big Data Security & Privacy Trust management in IoT and
    9 KB (1,351 words) - 06:28, 7 August 2023
  • Measurements of human behavior and security Privacy-enhancing technologies and anonymity Usable security and privacy Language-based security Hardware security
    3 KB (459 words) - 14:23, 19 October 2022
  • 2022-09-19 35th IAC IAA Symposium on Space Policy, Regulations and Economics 2022 IAC IAA Symposium on Space Policy, Regulation and Economics 2022-09-19 TransAI
    372 bytes (12 words) - 11:12, 3 November 2022
  • automatically configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing
    4 KB (575 words) - 15:27, 19 October 2022
  • trustworthy infrastructures ● Trust, Security and Privacy in embedded systems ● Trust, Security and Privacy in social networks ● Trusted mobile platforms and
    5 KB (800 words) - 14:24, 19 October 2022
  • Coding, modulation and medium access schemes * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques * System Tools: Tools for the design
    4 KB (555 words) - 15:27, 19 October 2022
  • 2022-09-19 35th IAC IAA Symposium on Space Policy, Regulations and Economics 2022 IAC IAA Symposium on Space Policy, Regulation and Economics 2022-09-19 TransAI
    378 bytes (12 words) - 11:05, 3 November 2022
  • Management Data Security Application Security Security Policy Authentication & Authorisation Privacy Software Protection Mobile Security Network Security
    2 KB (322 words) - 14:44, 19 October 2022
  • Middleware Existing paradigms revisited: object, component, aspect, agent Privacy, Trust, and Security is Distributed Systems Context Awareness and Self-Adaptation
    2 KB (296 words) - 15:28, 19 October 2022
  • Brokerage * Government Policy and Regulation * Corporate Finance and Governance * Capital Budgeting, Investment Policy * Financing Policy, Capital and Ownership
    10 KB (1,011 words) - 14:03, 19 October 2022
  • Digital payment systems o Authentication o Privacy-enhancing technologies o Economics of information security and privacy * Social factors, including o Usability
    9 KB (1,409 words) - 09:33, 4 August 2023
  • under the aegis of the Society for Research in Information Security and Privacy (SRISP). The acceptance ratio of the first twelve conferences has averaged
    5 KB (738 words) - 14:05, 19 October 2022
  • code - Intrusion detection, IDS / IPS in UE - Anonymity, user privacy, and location privacy in UE - Content protection and DRM for UCS - System/network management
    4 KB (558 words) - 15:27, 19 October 2022
  • networking technologies Privacy-preserving solutions Security models and threats Security and privacy properties and policies Verification and enforcement
    5 KB (717 words) - 14:19, 2 February 2024
  • algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, randomness
    6 KB (905 words) - 15:30, 19 October 2022
  • Security and privacy issues in mobile collaborative applications Trust models, trust negotiation/management for collaborative systems Policy-based management
    4 KB (620 words) - 15:29, 19 October 2022
  • presentations on managing information security Privacy Information Security Risk Analysis Security Policy and Procedures Small distribution applications
    4 KB (569 words) - 15:21, 19 October 2022
  • optimization Privacy and security Security, trust and risk in big data Data integrity, matching and sharing Privacy and protection standards and policies Privacy
    4 KB (596 words) - 14:27, 24 August 2022
  • code * Intrusion detection, IDS / IPS in UE * Anonymity, user privacy, and location privacy in UE * Content protection and DRM for UCS * System/network management
    6 KB (858 words) - 15:27, 19 October 2022
  • reputation, privacy and communities - e-health and privacy - anonymity and medical research - employee privacy and network administration - privacy and location-based
    12 KB (1,720 words) - 15:28, 19 October 2022
  • networked systems Internet measurement and modeling Internet economics and policy Innovative uses of network data beyond communication Mobile and Wireless
    3 KB (394 words) - 15:36, 15 December 2022
  • Hierarchical management Federated management Autonomic and cognitive management Policy-based management Intent-based management Pro-active management Energy-aware
    3 KB (423 words) - 14:37, 24 July 2023
  • algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, randomness
    5 KB (876 words) - 15:30, 19 October 2022
  • Proxies and middleware for wireless networks • Wireless network security and privacy • Performance of E2E protocols over wireless networks • Interworking heterogeneous
    6 KB (831 words) - 15:30, 19 October 2022
  • Issues - eHealth Policy and Practice - eHealthcare Strategies and Provision - Legal Issues - Medical Research Ethics - Patient Privacy and Confidentiality
    6 KB (808 words) - 14:55, 19 October 2022
  • of Network Governance o Privacy - a pervading issue o Attribution and identify management; anonymity and ID * Physical and policy infrastructure of the Internet
    4 KB (660 words) - 15:21, 19 October 2022
  • large-scale and complex, involving difficult social and policy issues such as those related to privacy and security access. Mobile technologies are devoted
    8 KB (1,107 words) - 15:28, 19 October 2022
  • data warehousing - Security and Privacy: cryptography; access control; security in domain-specific applications; privacy and trust - Services Science: service-oriented
    9 KB (1,297 words) - 14:46, 19 October 2022
  • networked systems Internet measurement and modeling Internet economics and policy Innovative uses of network data beyond communication Mobile and Wireless
    4 KB (661 words) - 12:31, 6 June 2023
  • Scalable Computing * Intelligent Information & Database Systems * Security and Privacy * Social Computing * Soft Computing * Software Design Patterns & Engineering
    5 KB (608 words) - 14:03, 19 October 2022
  • ‘information security’ and ‘user privacy’ can be ensured. In answer to these concerns, the 7th International Conference on Trust, Privacy and Security in Digital
    8 KB (1,074 words) - 15:29, 19 October 2022
  • devices * Support for mobile social networking and mobile Web * Security and privacy in mobile systems * Systems for location and context sensing and awareness
    7 KB (1,090 words) - 09:23, 29 August 2023
  • Detection and Analysis · Privacy and Anonymity · Secure Localization and Synchronization · Security and Performance tradeoff · Security Policy and Enforcement Issues
    4 KB (580 words) - 15:20, 19 October 2022
  • must be designed with privacy considerations. To address these issues, we invite original research papers on the security and/or privacy of Cyber-Physical
    4 KB (688 words) - 13:06, 19 October 2022
  • Security and Privacy • Network Security • Peer-to-Peer Security & Privacy • Cryptographic Algorithms and Primitives • Security and Privacy for Big Data
    2 KB (304 words) - 11:47, 8 December 2023
  • and Analysis of Algorithms Foundations of Machine Learning Foundations of Privacy, Trust and Reputation in Network Network Models for Distributed Computing
    5 KB (672 words) - 08:41, 27 September 2023
  • counter-terrorism or security protection • Information sharing policy and governance • Privacy, security, and civil liberties issues • Emergency response and
    4 KB (525 words) - 12:04, 29 January 2024
  • counter-terrorism or security protection Information sharing policy and governance Privacy, security, and civil liberties issues Emergency response and
    5 KB (630 words) - 12:01, 29 January 2024
  • pervasive software Model-driven software engineering Patterns and frameworks Policy and ethics Processes and workflows Program analysis Program comprehension
    4 KB (486 words) - 09:41, 7 August 2023
  • data. * Data integrity, matching and sharing. * Privacy and protection standards and policies. * Privacy preserving big data access/analytics. * Fairness
    3 KB (386 words) - 13:08, 19 October 2022
  • Versioning and Data Quality Management Semantics for Safety, Security & Privacy Web Semantics, Linked (Open) Data & schema.org Corporate Knowledge Graphs
    6 KB (883 words) - 14:20, 19 October 2022
  • devices * Support for mobile social networking and mobile Web * Security and privacy in mobile systems * Resource-efficient machine learning for mobile platforms
    6 KB (855 words) - 09:21, 29 August 2023
  • learning and emergence Normative systems Organisations and institutions Policy, regulation and legislation Representations and reasoning about norms and
    6 KB (772 words) - 11:10, 3 July 2023
  • Questions of Privacy, Governance & Trust Submissions dealing with the following areas should submit under this stream: - Implications for Security, Privacy, International
    6 KB (770 words) - 14:45, 19 October 2022
  • may also be recommended to the Work-in-Progress Track. Review Policy ============= IEEE Policy and professional ethics require that referees treat the contents
    9 KB (1,353 words) - 09:04, 18 December 2023
  • 14:Event IMCL
    Topics: Impact of mLearning on social change Security and privacy Legal issues and mGovernment Policy and regulation mPolitics; mDemocracy and mVoting mGovernment
    11 KB (1,187 words) - 15:20, 19 October 2022
  • interest (according to the COI rules at http://www.sigsoft.org/about/policies/pc-policy.htm) with the Program Board and Program Committee members. Note also
    4 KB (549 words) - 09:34, 7 August 2023
  • major international forum for researchers, practitioners, managers, and policy makers interested in computer software and applications. MIDDLEWARE ENGINEERING
    6 KB (898 words) - 15:26, 19 October 2022
  • devices Support for mobile social networking and mobile Web Security and privacy in mobile systems Systems for location and context sensing and awareness
    5 KB (858 words) - 09:20, 29 August 2023
  • devices Support for mobile social networking and mobile Web Security and privacy in mobile systems Resource-efficient machine learning for mobile platforms
    6 KB (900 words) - 09:09, 29 August 2023
  • -Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques -Privacy and anonymity technologies -Network perimeter controls: firewalls, packet
    6 KB (916 words) - 15:27, 19 October 2022
  • defects such as tears or blemishes Security Documents and privacy Secure document workflows, policy, and access, security for mobile and printing devices Security
    4 KB (523 words) - 07:23, 7 August 2023
  • algorithms - Data privacy and trustiness - Identity management - Information hiding and DRM - Key management and authentication - Location privacy and secure
    6 KB (955 words) - 15:30, 19 October 2022
  • Networking and System (CRN) o Spectrum sensing and spectrum management o Policy between primary user and secondary user o Cooperation and gaming strategies
    14 KB (1,681 words) - 14:45, 19 October 2022
  • Information Technology Audit, Steganalysis, Data Remanence, Information Privacy, Usable Security, etc... Prospective authors are required to submit full-length
    3 KB (429 words) - 14:56, 19 October 2022
  • language semantics proof theory real-time systems reasoning about security and privacy rewriting type systems and type theory and verification Formatting instructions:
    4 KB (610 words) - 14:13, 19 October 2022
  • E-governance, policy and law E-healthcare and gerontechnology Knowledge management and sharing New technology adoption and diffusion Security and privacy issues
    3 KB (344 words) - 14:05, 19 October 2022
  • Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques. * Privacy and anonymity technologies. * Network perimeter controls: firewalls, packet
    5 KB (796 words) - 15:28, 19 October 2022
  • real-time embedded systems; composition of services (e.g., robustness, privacy, safety, security) for real-time embedded systems. --------------------
    6 KB (813 words) - 14:46, 19 October 2022
  • reliability, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusion detection/awareness, protocols, etc
    9 KB (1,323 words) - 14:45, 19 October 2022
  • 2009 is Intelligent Systems for Information Assurance, Security, and Public Policy in the Age of e-Euphoria. Conference main theme will be supported by the
    16 KB (2,311 words) - 15:30, 19 October 2022
  • event intentionally seeks scientists, engineers, educators, industry people, policy makers, decision makers, and others who have insight, vision, and understanding
    5 KB (743 words) - 15:22, 19 October 2022
  • enrichment, linking techniques and standards Documents and privacy Secure document workflows, policy, and access, security for mobile and printing devices Security
    4 KB (224 words) - 10:03, 5 August 2023
  • enrichment, linking techniques and standards Documents and privacy Secure document workflows, policy, and access, security for mobile and printing devices Security
    4 KB (223 words) - 09:24, 5 August 2023
  • Governance, democracy, access, intellectual property: Personal data and privacy Anonymity, security and trust for Web access Web access, literacy, divides
    8 KB (1,094 words) - 09:34, 4 August 2023
  • counter-terrorism or security protection Information sharing policy and governance Privacy, security, and civil liberties issues Emergency response and
    9 KB (1,152 words) - 12:02, 29 January 2024
  • workflow and ECA systems - real-time databases - time-dependent security policies - privacy in temporal and spatio-temporal data - temporal aspects of multimedia
    6 KB (943 words) - 15:30, 19 October 2022
  • security - language-based security - network security - non-interference - privacy-enhancing technology - pseudonymity - subliminal channels - trustworthy
    6 KB (849 words) - 14:55, 19 October 2022
  • Indexing, or Storage Data Integrity, Security, Protection, Privacy Standards and Policies for Data Management Novel Applications Multimedia Forensics
    5 KB (792 words) - 14:13, 19 October 2022
  • E-Business Models of economic rationality. Trust and reputation. Issues of privacy of communication, data security, and jurisdiction for agent-mediated trading
    9 KB (1,364 words) - 14:45, 19 October 2022
  • models and conversational interaction Web search and data mining under privacy constraints Papers must be submitted in PDF according to the new ACM format
    8 KB (1,217 words) - 08:59, 8 November 2022
  • IQ Assessment _ Cost/Benefit Analysis of IQ Improvement _ IQ Policies and Standards _ Privacy Preservation and Security Issues in the Process of Data Cleaning
    5 KB (801 words) - 14:55, 19 October 2022
  • aware of and conform to acceptable use policies for individual domains that are probed or monitored, data privacy and anonymity for all personally identifiable
    6 KB (907 words) - 15:20, 19 October 2022
  • protocols & policies Secure ontology-based systems Standards, guidelines and certification Security-aware software engineering Trust and privacy Following
    10 KB (1,408 words) - 15:29, 19 October 2022
  • author of the best student papers should be full-time student. Review Policy: "IEEE Policy and professional ethics requires that referees treat the contents
    18 KB (2,539 words) - 15:27, 19 October 2022
  • engineer agent and multi-agent systems that are secure and protect the privacy concerns of users? The topics include but are not limited to: Programming
    9 KB (1,268 words) - 13:32, 19 October 2022
  • driven architecture for RTSOAA Database modeling & management for RTSOAA Policy driven management for RTSOAA Middleware & infrastructure for RTSOAA Real-time
    7 KB (1,033 words) - 15:28, 19 October 2022
  • ecosystems Change management in service ecosystems Trust, security, and privacy aspects of service ecosystem Interdisciplinary studies of service ecosystem
    4 KB (710 words) - 14:55, 19 October 2022
  • SEPA 09 16) Sensor Network and its Applications - SNA 09 17) Security & Privacy in Pervasive Computing environments - SPPC 09 18) Wireless and Ad Hoc Networking
    10 KB (1,421 words) - 14:56, 19 October 2022
  • o Satellite systems/networks and high altitude platforms o Security and privacy o Self-organization of wireless networks o Traffic management o Transport
    9 KB (1,300 words) - 15:27, 19 October 2022
  • the Web of Data [OM] Ontology Matching [PrivOn] Society, Privacy and the Semantic Web - Policy and Technology [PROFILES] Dataset PROFlLing and fEderated
    11 KB (1,574 words) - 07:00, 2 February 2024
  • Smart Homes & Smart Grids Food, Agriculture & Farming Safety, Security & Privacy Transport, Environment & Geospatial We invite contributions to the following
    12 KB (1,700 words) - 14:19, 19 October 2022
  • Explainable Artificial Intelligence Semantics in Data Science Trust, Data Privacy, and Security with Semantic Technologies Economics of Data, Data Services
    7 KB (1,012 words) - 14:18, 19 October 2022
  • 2023-10-02 → 2023-10-06 Azerbaijan (AZ) 36th IAC IAA Symposium on Space Policy, Regulations and Economics 2023 2023-10-02 → 2023-10-06 Azerbaijan (AZ)
    808 bytes (10,171 words) - 10:31, 27 November 2023
Cookies help us deliver our services. By using our services, you agree to our use of cookies.