Privacy engineering

Results: 1416



#Item
21Computing / Security / Policy / Crime prevention / Cryptography / Information governance / National security / Internet privacy / Privacy policy / Privacy / Computer security / Cloud computing

Embracing Policy Engineering Kathi Fisler Shriram Krishnamurthi Daniel J. Dougherty

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2010-10-21 09:43:59
22Internet / Identity management / Law / Privacy / Computing / Internet privacy / Internet Engineering Task Force

IEEE 802ECSG Privacy Recommendation Minutes of EC Privacy Recommendation SG Teleconference July 1st, 2015 Author(s):

Add to Reading List

Source URL: mentor.ieee.org

Language: English - Date: 2015-10-20 19:54:24
23Computer programming / Computing / Software engineering / Index of standards articles / Standards / Index of Abkhazia-related articles

privacy notice for integral commercial

Add to Reading List

Source URL: www.vivaaerobus.com

Language: English - Date: 2016-04-21 10:24:28
24Automatic identification and data capture / Privacy / Radio-frequency identification / Ubiquitous computing / Wireless / Car dealership / Software engineering / MDL / Computer programming / Computing

MyDealerLot Logo - Reg_norings

Add to Reading List

Source URL: mydealerlot.com

Language: English - Date: 2015-07-13 03:34:24
25Software / Computing / Digital media / Social media / Social networking services / Cybercrime / Social networks / Universal Windows Platform apps / Social engineering / Internet privacy / Computer security / Facebook

North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources Best Practices for State Agency Social Media Usage in North Carolina Version

Add to Reading List

Source URL: digitalpreservation.ncdcr.gov

Language: English - Date: 2016-05-02 15:16:04
26Internet / Computing / Internet Standards / Internet privacy / Internet Engineering Task Force / Internet Draft / HTTP cookie / Do Not Track / Communications protocol / Open standard / MPLS-TP

Microsoft Word - IETF-General-Privacy-Statementdocx

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-25 17:09:26
27Computing / File sharing / Concurrent computing / Distributed computing / Network architecture / Peer-to-peer / Telecommunications engineering / Distributed hash table / Social peer-to-peer processes / Overlay network / Computer network / Mesh networking

itDecentralized Communication against Surveillance and Privacy Violation Kalman Graffi

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-05-17 12:18:49
28Cryptographic protocols / WLAN Authentication and Privacy Infrastructure / Computing / Wireless security / IEEE 802.11i-2004 / IEEE 802.11 / Registration authority / Reference / Engineering

November 2005 doc.: IEEE1205r0 IEEE P802.11 Wireless LANs IEEEWorking Group Comments on 1N7904 Date:

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2006-02-03 09:11:22
29ASME / Business process mapping / Privacy / Internet privacy / Economy / Business / Engineering

Terms and Conditions 1. ACCEPTANCE OF TERMS ASME Human Powered Vehicle (HPVC) Challenge is open to all ME/Multidisciplinary Engineering and Technology undergraduate students, subject to the following Terms and Conditions

Add to Reading List

Source URL: www.asme.org

Language: English - Date: 2016-02-10 15:34:37
30Web services / Emerging technologies / Knowledge engineering / Semantic Web / Context awareness / Semantics / Computing / Information science / Logic

Semantic Web Technologies to Reconcile Privacy and Context Awareness Norman M. Sadeh, Associate Professor, ISRI - School of Computer Science, CMU Abstract: Increasingly, application developers are looking for ways to pro

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-05-05 09:40:12
UPDATE