Search For:

Displaying 1-9 out of 9 total
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
Found in: Computer Software and Applications Conference, Annual International
By Axel Schröpfer,Florian Kerschbaum,Günter Müller
Issue Date:July 2011
pp. 298-307
Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several general protocols for SC have been proposed and recently been implemented in a ...
 
Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Jérémie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller, Pascal Lafourcade
Issue Date:October 2010
pp. 510-513
Security is one of the biggest concerns about Cloud Computing. Most issues are related to security problems faced by cloud providers, who have to ensure that their infrastructure is properly secure and client data are protected, and by the customers, who m...
 
On Privacy-aware Delegation of Personal Data using Digital Watermarking
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Sven Wohlgemuth, Noboru Sonehara, Isao Echizen, Günter Müller
Issue Date:September 2009
pp. 56-59
No summary available.
 
On Information Flow Forensics in Business Application Scenarios
Found in: Computer Software and Applications Conference, Annual International
By Claus Wonnemann, Rafael Accorsi, Günter Müller
Issue Date:July 2009
pp. 324-328
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business software applications and their deployment may be labeled secure, whereas in fac...
 
Automating Privacy Compliance with ExPDT
Found in: E-Commerce Technology and Enterprise Computing, E-Commerce and E-Services, IEEE Conference and Fifth IEEE Conference
By Martin Kähmer, Maike Gilliot, Günter Müller
Issue Date:July 2008
pp. 87-94
Today, personalized services are lucrative for service providers and their customers. With their increasing pervasiveness and interconnection, however, customers show concerns about their privacy. If customers were to refuse the processing of their persona...
 
On Providing One-to-One Marketing with Customers' Privacy in Stationary Retail
Found in: E-Commerce Technology and Enterprise Computing, E-Commerce and E-Services, IEEE Conference and Fifth IEEE Conference
By Jens Strüker, Rafael Accorsi, Günter Müller
Issue Date:July 2008
pp. 44-49
Electronic commerce has provided retailers with effective instruments to deploy one-to-one marketing over the internet. While the increasing use of sensors, RFID tags and other technologies enables the deployment of one-to-one marketing also in stationary ...
 
Case Study on Retail Customer Communication Applying Ubiquitous Computing
Found in: E-Commerce Technology, IEEE International Conference on
By Jens Strüker, Stefan Sackmann, Günter Müller
Issue Date:July 2004
pp. 42-48
The use of mobile information systems and communication technology furthers the informatization and automation of operating processes. In the retail industry, mobile communication technology affords new forms of customer communication by establishing elect...
 
Preventive Inference Control in Data-centric Business Models
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Rafael Accorsi,Gunter Muller
Issue Date:May 2013
pp. 28-33
Inference control is a modern topic in data usage management, especially in the context of data-centric business models. However, it is generally not well understood how protection mechanisms could be designed to protect the users. The contributions of thi...
   
Introduction
Found in: Communications of the ACM
By Gunter Muller
Issue Date:September 2006
pp. 28-31
Give instructors the option of turning off wireless Web access to accommodate their students' learning styles, in some cases to save them from themselves.
     
 1