- Datenschutz hat einen hohen Stellenwert für die Technische Informationsbibliothek (TIB). Eine Nutzung der Dienstleistungen der TIB ist grundsätzlich ohne9 KB (963 words) - 11:57, 12 September 2023
- Cryptanalysis Privacy Policy Analysis Query Execution over Privacy-Sensitive Data Privacy Preserving Data Mining Privacy for IntegrityBased Computing Privacy Monitoring7 KB (1,038 words) - 13:08, 19 October 2022
- mobile computing Privacy-aware information retrieval Privacy-aware computation outsourcing Privacy-preserving data collection Privacy-aware data mining4 KB (672 words) - 14:08, 19 October 2022
- incompatible formats, and erroneous data Privacy and security policies and social impact of data mining Privacy preserving data integration Access control7 KB (1,004 words) - 14:45, 19 October 2022
- es by ana.sofia@informatics-conf.org | Print / PDF version | Read our Privacy Policy. This CfP was obtained from WikiCFP5 KB (685 words) - 15:23, 19 October 2022
- adaptive policy systems * Database policies * Policy applications in on-demand, utility based computing * Resource virtualization and policy-based collaboration5 KB (786 words) - 15:28, 19 October 2022
- Technologies * Privacy-Preserving Computing * Privacy Policies and Laws * Economics of Privacy * Privacy Theory and Engineering * Natural Disasters and2 KB (307 words) - 20:43, 22 September 2022
- digital media licenses * authorization * access control * security policies * privacy policies * business processes * regulatory compliance We welcome both theoretical5 KB (690 words) - 14:45, 19 October 2022
- Non-Repudiation of Data § Identity Management and Mapping § Privacy in Advanced Database Applications § Privacy Preserving Querying and Mining This CfP was obtained3 KB (403 words) - 15:28, 19 October 2022
- and privacy for the Internet of Things Security and privacy metrics Security and privacy policies Security architectures Usable security and privacy Trustworthy4 KB (510 words) - 14:18, 19 October 2022
- otherwise noted. <a href="/index.php/ConfIDent:Privacy_policy" title="ConfIDent:Privacy policy">Privacy policy</a> <a href="/index.php/ConfIDent:About" ti29 KB (2,337 words) - 13:00, 19 October 2022
- ComputingPlainsPlanetary SciencesPlanningPlanning ResearchPlasmonicsPlatformPoetryPoliciesPolicyPolicy AdvocacyPolitical SciencePoliticsPollution ControlPolyhedral ModelPop305 bytes (1,165 words) - 16:17, 2 February 2023
- otherwise noted. <a href="/index.php/ConfIDent:Privacy_policy" title="ConfIDent:Privacy policy">Privacy policy</a> <a href="/index.php/ConfIDent:About" ti44 KB (2,871 words) - 14:22, 19 October 2022
- 2020 Security and Privacy for IoT: IoT security protocols and architectures Anonymization techniques Trust and identity management Privacy data protection6 KB (888 words) - 14:18, 19 October 2022
- otherwise noted. <a href="/index.php/ConfIDent:Privacy_policy" title="ConfIDent:Privacy policy">Privacy policy</a> <a href="/index.php/ConfIDent:About" ti29 KB (2,357 words) - 15:21, 19 October 2022
- Rights Management Systems; Security Policy Analysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies. Networking3 KB (468 words) - 06:52, 21 November 2022
- Rights Management Systems; Security Policy Analysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies. Networking3 KB (419 words) - 15:47, 15 December 2022
- Adaptive security policy management * Security, trust and privacy for service oriented architectures * Mobile security * Anonymity and privacy vs. accountability4 KB (662 words) - 15:23, 19 October 2022
- latest work in privacy, security and trust and to show how this research can be used to enable innovation. This year’s theme is “Privacy, Security and Trust4 KB (596 words) - 14:18, 19 October 2022
- Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing2 KB (369 words) - 15:30, 19 October 2022
- knowledge sources -Semantic technology and privacy by design -Semantic technology and privacy impact assessments -Privacy challenges arising from Linked Open7 KB (1,014 words) - 14:19, 19 October 2022
- discrimination policy. For full details, please visit this site: https://www.acm.org/special-interest-groups/volunteer-resources/officers-manual/policy-agains36 KB (5,252 words) - 11:51, 4 August 2023
- development. * Issues of technology policy and public policy in multimedia security, for example DRM, copyright, privacy, interoperability and accessibility3 KB (388 words) - 15:28, 19 October 2022
- Digital Ecosystems • Privacy Preservation and Policy Administration for Dependability in Digital Ecosystems • Privacy Assurance and Privacy Risk Assessment4 KB (691 words) - 15:29, 19 October 2022
- trustworthy infrastructures Trust, Security and Privacy in embedded systems Trust, Security and Privacy in social networks Trusted mobile platforms and4 KB (575 words) - 15:30, 19 October 2022
- 2017-10-21 → 2017-10-25 Semantic Web 5th International Workshop on Society, Privacy and the Semantic Web Policy and Technology 2017-10-21 → 2017-10-25 Semantic Web Workshop104 bytes (2,266 words) - 11:56, 21 October 2022
- Services Computing * Privacy, Traceability, and Anonymity * Trust and Reputation in Self-Organizing Environments * Anonymity and Privacy vs. Accountability6 KB (853 words) - 15:28, 19 October 2022
- Security and privacy in GIS/spatial data Security and privacy in healthcare Security and privacy in the Internet of Things Security policies for databases6 KB (995 words) - 10:17, 15 December 2022
- Detection using Big Data Analytics Privacy Preserving Big Data Collection/Analytics HCI Challenges for Big Data Security & Privacy Trust management in IoT and9 KB (1,351 words) - 06:28, 7 August 2023
- Measurements of human behavior and security Privacy-enhancing technologies and anonymity Usable security and privacy Language-based security Hardware security3 KB (459 words) - 14:23, 19 October 2022
- 2022-09-19 35th IAC IAA Symposium on Space Policy, Regulations and Economics 2022 IAC IAA Symposium on Space Policy, Regulation and Economics 2022-09-19 TransAI372 bytes (12 words) - 11:12, 3 November 2022
- automatically configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing4 KB (575 words) - 15:27, 19 October 2022
- trustworthy infrastructures ● Trust, Security and Privacy in embedded systems ● Trust, Security and Privacy in social networks ● Trusted mobile platforms and5 KB (800 words) - 14:24, 19 October 2022
- Coding, modulation and medium access schemes * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques * System Tools: Tools for the design4 KB (555 words) - 15:27, 19 October 2022
- 2022-09-19 35th IAC IAA Symposium on Space Policy, Regulations and Economics 2022 IAC IAA Symposium on Space Policy, Regulation and Economics 2022-09-19 TransAI378 bytes (12 words) - 11:05, 3 November 2022
- Management Data Security Application Security Security Policy Authentication & Authorisation Privacy Software Protection Mobile Security Network Security2 KB (322 words) - 14:44, 19 October 2022
- Middleware Existing paradigms revisited: object, component, aspect, agent Privacy, Trust, and Security is Distributed Systems Context Awareness and Self-Adaptation2 KB (296 words) - 15:28, 19 October 2022
- Brokerage * Government Policy and Regulation * Corporate Finance and Governance * Capital Budgeting, Investment Policy * Financing Policy, Capital and Ownership10 KB (1,011 words) - 14:03, 19 October 2022
- Digital payment systems o Authentication o Privacy-enhancing technologies o Economics of information security and privacy * Social factors, including o Usability9 KB (1,409 words) - 09:33, 4 August 2023
- under the aegis of the Society for Research in Information Security and Privacy (SRISP). The acceptance ratio of the first twelve conferences has averaged5 KB (738 words) - 14:05, 19 October 2022
- code - Intrusion detection, IDS / IPS in UE - Anonymity, user privacy, and location privacy in UE - Content protection and DRM for UCS - System/network management4 KB (558 words) - 15:27, 19 October 2022
- networking technologies Privacy-preserving solutions Security models and threats Security and privacy properties and policies Verification and enforcement5 KB (717 words) - 14:19, 2 February 2024
- algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, randomness6 KB (905 words) - 15:30, 19 October 2022
- Security and privacy issues in mobile collaborative applications Trust models, trust negotiation/management for collaborative systems Policy-based management4 KB (620 words) - 15:29, 19 October 2022
- presentations on managing information security Privacy Information Security Risk Analysis Security Policy and Procedures Small distribution applications4 KB (569 words) - 15:21, 19 October 2022
- optimization Privacy and security Security, trust and risk in big data Data integrity, matching and sharing Privacy and protection standards and policies Privacy4 KB (596 words) - 14:27, 24 August 2022
- code * Intrusion detection, IDS / IPS in UE * Anonymity, user privacy, and location privacy in UE * Content protection and DRM for UCS * System/network management6 KB (858 words) - 15:27, 19 October 2022
- reputation, privacy and communities - e-health and privacy - anonymity and medical research - employee privacy and network administration - privacy and location-based12 KB (1,720 words) - 15:28, 19 October 2022
- networked systems Internet measurement and modeling Internet economics and policy Innovative uses of network data beyond communication Mobile and Wireless3 KB (394 words) - 15:36, 15 December 2022
- Hierarchical management Federated management Autonomic and cognitive management Policy-based management Intent-based management Pro-active management Energy-aware3 KB (423 words) - 14:37, 24 July 2023