Privacy software

Results: 6129



#Item
71Contract law / Law / Private law / Common law / Indemnity / Terms of service / Contract / Copyright law of the United States / Trademark / Government procurement in the United States / Medical privacy / Warranty

LOOPER-IT OY GENERAL TERMS AND CONDITIONS OF USE OF THE DRIVELOOPER SOFTWARE (the Service) Last updated onWe offer this Service, subject to the following terms and conditions (the Agreement). Please read this

Add to Reading List

Source URL: mapserver.drivelooper.com

Language: English - Date: 2014-03-12 06:57:26
72Software / Computing / Social networking services / Social information processing / Facebook / Universal Windows Platform apps / Cloud applications / Internet privacy / Facebook Platform / Web 2.0 / Unity / Recommender system

Social Applications: Exploring A More Secure Framework Andrew Besmer, Heather Richter Lipford, Mohamed Shehab, Gorrell Cheek Department of Software and Information Systems University of North Carolina at Charlotte 9201 U

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-05-28 10:41:50
73Software / Computing / Digital media / Internet search engines / Web applications / Yahoo! Groups / Yahoo! / Internet forum / Internet privacy / Email / Yahoo! Mail / Criticism of Yahoo!

ChevyChaseViewNet Acceptable Use Guidelines November 2005 NAME: ChevyChaseViewNet Acceptable Use Guidelines STATEMENT: ChevyChaseViewNet is a forum on Yahoo! Groups for residents of the Town of Chevy Chase View, Maryland

Add to Reading List

Source URL: www.chevychaseview.org

Language: English - Date: 2012-10-30 06:34:08
74Logic / Mathematical logic / Automated theorem proving / Logic programming / Logical truth / Propositional calculus / Substitution / FO / Constructible universe / Normal distribution

Temporal Mode-Checking for Runtime Monitoring of Privacy Policies Omar Chowdhury§ , Limin Jia§ , Deepak Garg† , and Anupam Datta§ Carnegie Mellon University§ , Max Planck Institute for Software Systems† {omarc, l

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
75Software / Computing / Social information processing / Academia / Social networking services / Community building / Facebook / Social software / Recommender system / Internet privacy / Social network / Privacy concerns with social networking services

Chapter 1 Links Reconstruction Attack Using Link Prediction Algorithms to Compromise Social Networks Privacy Michael Fire, Gilad Katz, Lior Rokach, and Yuval Elovici1

Add to Reading List

Source URL: proj.ise.bgu.ac.il

Language: English - Date: 2012-05-05 05:45:54
76Software / Computing / Social networking services / Social media / Universal Windows Platform apps / Windows Phone / Smartphones / Facebook / Twitter / In Case of Emergency / Privacy concerns with social networking services

PDF Document

Add to Reading List

Source URL: readymarin.org

Language: English - Date: 2013-11-20 13:33:24
77Computer programming / Computing / Software engineering / Index of standards articles / Standards / Index of Abkhazia-related articles

privacy notice for integral commercial

Add to Reading List

Source URL: www.vivaaerobus.com

Language: English - Date: 2016-04-21 10:24:28
78Software / Computing / Internet privacy / Web browsers / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet Explorer / Internet Explorer 8 / Adobe Flash / Safari / Opt-out

Cookie Policy About our cookies – supporting informed choice The detail contained on this page is provided to ensure that you are fully aware of all the cookies being used to allow you to make an informed choice about

Add to Reading List

Source URL: assets.markallengroup.com

Language: English - Date: 2016-04-01 02:46:05
79Cryptography / Public key infrastructure / Email authentication / Public-key cryptography / Cryptographic software / Email encryption / Encryption / Email client / Email / Cipher / Draft:GoldBug / Email privacy

Email security for counsellors With the increasing use of online counselling within student counselling services, preserving confidentiality is a major concern. Stephen Allsopp explains how sending an email is the equiva

Add to Reading List

Source URL: bacpuc.org.uk

Language: English - Date: 2016-02-25 06:22:14
80Computing / Data management / Software / Query languages / Database / SQL / Private information retrieval / Database management systems

Practical and Privacy-Preserving Policy Compliance for Outsourced Data Giovanni Di Crescenzo1 , Joan Feigenbaum2 , Debayan Gupta2 , Euthimios Panagos1 , Jason Perry3 , Rebecca N. Wright3 1

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2014-07-23 16:19:30
UPDATE