Privacy engineering

Results: 1416



#Item
71

PRIVACY AS A BASE FOR CONFIDENTIALITY Sabah S. Al-Fedaghi Computer Engineering Department Kuwait University

Add to Reading List

Source URL: infosecon.net

Language: English - Date: 2006-03-16 20:15:32
    72

    Internet Engineering Task Force Privacy Statement The IETF operates in an open and transparent fashion The IETF operates in an open and transparent fashion. As a part of the openness focus, any postings you make to IETF

    Add to Reading List

    Source URL: iaoc.ietf.org

    Language: English - Date: 2015-08-28 12:10:57
      73Software / Computer architecture / System software / Computing platforms / Smartphones / Cross-platform software / Alphabet Inc. / Android / Linux namespaces / Mobile security / Kernel / Namespace

      PINPOINT: Efficient & Effective Resource Isolation for Mobile Security & Privacy Paul Ratazzi, Ashok Bommisetti, Nian Ji, and Prof. Wenliang (Kevin) Du Department of Electrical Engineering & Computer Science

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2015-06-05 20:26:09
      74Privacy / Digital rights / Computing / Economy / Identity management / Copyright law / Law / Human rights / Digital rights management / Internet privacy / Information privacy / Consumer privacy

      Privacy Engineering for Digital Rights Management Systems Joan Feigenbaum1? , Michael J. Freedman2?? , Tomas Sander3 , Adam Shostack4 1 1

      Add to Reading List

      Source URL: adam.shostack.org

      Language: English - Date: 2014-06-11 11:42:01
      75

      I Know What You’re Buying: Privacy Breaches on eBay Tehila Minkus1 and Keith W. Ross1,2 1 Dept. of Computer Science and Engineering, NYU

      Add to Reading List

      Source URL: petsymposium.org

      Language: English - Date: 2014-06-27 07:04:35
        76

        GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits Thomas Schneider and Michael Zohner Engineering Cryptographic Protocols Group (ENCRYPTO), European Center for Security and Privacy by Design (EC

        Add to Reading List

        Source URL: fc13.ifca.ai

        Language: English - Date: 2013-03-27 20:42:00
          77

          & Requirements and Policy Languages Travis Breaux August 31, 2015 Privacy by Design – Engineering Privacy

          Add to Reading List

          Source URL: cra.org

          Language: English - Date: 2015-08-31 11:47:09
            78

            ! ! CCC!Engineering!Privacy!Workshop! 2015! Prac8cal!Deiden8fica8on! !

            Add to Reading List

            Source URL: cra.org

            Language: English - Date: 2015-09-02 11:54:18
              79Health / Medicine / Nursing informatics / Medical ethics / Health care / Health informatics / Medical technology / Patient safety / Nursing / Healthcare Engineering / Mental health professional

              University of California Job Families and Functions Audit Compliance and Ethics Advocacy Audit Ethics and Compliance MC Compliance and Privacy

              Add to Reading List

              Source URL: hr.ucr.edu

              Language: English - Date: 2015-08-26 17:14:56
              UPDATE