Dawn N. Jutla

According to our database1, Dawn N. Jutla authored at least 64 papers between 1993 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Supporting Long-term Transactions in Smart Contracts.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

2021
Using FSMs to Find Patterns for Off-Chain Computing: Finding Patterns for Off-Chain Computing with FSMs.
Proceedings of the ICBCT '21: The 3rd International Conference on Blockchain Technology, 2021

A Tool for Moving Blockchain Computations Off-Chain.
Proceedings of the BSCI '21: Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2021

2015
PAUSE: A privacy architecture for heterogeneous big data environments.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

PIP: An Injection Pattern for Inserting Privacy Patterns and Services in Software.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

2013
Engineering Privacy for Big Data Apps with the Unified Modeling Language.
Proceedings of the IEEE International Congress on Big Data, 2013

2012
Trade-Offs in a Google Distance and a WordNet Hybrid for QoS-Enabled Web Services Composition.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012

2011
Differential Caches for Web Services in Mobile Environments.
Proceedings of the IEEE International Conference on Web Services, 2011

Flexible Ontology-Independent and QOS-Enabled Dynamic Web Services Composition Using Google Distance.
Proceedings of the IEEE International Conference on Services Computing, 2011

2009
Uncertain inference control in privacy protection.
Int. J. Inf. Sec., 2009

<i>wise</i>Pad services for vision-, hearing-, and speech-impaired users.
Commun. ACM, 2009

2008
Applying the Delta model to mobile marketing management in the US marketplace.
Int. J. Electron. Bus., 2008

Consistent privacy preferences (CPP): model, semantics, and properties.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Privacy with Web Serivces: Intelligence Gathering and Enforcement.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008

2007
Management of Users' Privacy Preferences in Context.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

Compliance of Privacy Policies with Legal Regulations - Compliance of Privacy Policies with Canadian PIPEDA.
Proceedings of the ICE-B 2007, 2007

Usable SPACE: Security, Privacy, and Context for the Mobile User.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
PeCAN: An architecture for users' privacy-aware electronic commerce contexts on the semantic web.
Inf. Syst., 2006

Reasoning about obfuscated private information: who have lied and how to lie.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Privacy Preserving Multiagent Probabilistic Reasoning about Ambiguous Contexts: A Case Study.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006

Temporal Context Lie Detection and Generation.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

Dynamic inference control in privacy preference enforcement.
Proceedings of the 2006 International Conference on Privacy, 2006

Probabilistic Internal Privacy Intrusion Detection.
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006

Adding User-Level SPACe: Security, Privacy, and Context to Intelligent Multimedia Information Architectures.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

A Bayesian Network Approach to Detecting Privacy Intrusion.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Contextual e-Negotiation for the Handling of Private Data in e-Commerce on a Semantic Web.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Auditing and Inference Control for Privacy Preservation in Uncertain Environments.
Proceedings of the Smart Sensing and Context, First European Conference, EuroSSC 2006, 2006

Privacy intrusion detection using dynamic Bayesian networks.
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006

2005
Sociotechnical Architecture for Online Privacy.
IEEE Secur. Priv., 2005

QTIP: Multi-Agent NLP and Privacy Architecture for Information Retrieval in Usable Web Privacy Software.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

Evaluation of Integration of ACBL and AOCC Caching Algorithms.
Proceedings of the Ninth International Database Engineering and Applications Symposium (IDEAS 2005), 2005

Maturing e-Privacy with P3P and Context Agents.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

A Churn-Strategy Alignment Model for Managers in Mobile Telecom.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

A Self-Managed Predicate-Based Cache.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

2004
Evaluation of User Intervention Mechanisms for Privacy on SME Online Trust.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

Web-based Support Systems (WSS): A Report of the WIC Canada Research Centre.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Interoperable Server-Based Cache Consistency Algorithm.
Proceedings of the 8th International Database Engineering and Applications Symposium (IDEAS 2004), 2004

Privacy Agents and Ontology for the Semantic Web.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2003
Architecture for User-Controlled e-Privacy.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

A Client-Side Business Model for Electronic Privacy.
Proceedings of the 16th Bled eConference: eTransformation, 2003

2002
Supporting the e-business readiness of small and medium-sized enterprises: approaches and metrics.
Internet Res., 2002

Supporting CLEAR: A Strategy for Small and Medium Size Enterprise Adoption of e-Business Practices in Atlantic Canada.
Proceedings of the Seeking Success in E-Business, 2002

Toolkit for QoS Monitoring in Middleware.
Proceedings of the ICEIS 2002, 2002

Government Support for E-readiness of Small and Medium Sized Enterprises.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

e-government In Execution : Building Organizational Infrastructure.
Proceedings of the 10th European Conference on Information Systems, 2002

QoS Monitoring In Middleware.
Proceedings of the 10th European Conference on Information Systems, 2002

2001
A Methodology for Creating E-Business Strategy.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001

Enabling and Measuring Electronic Customer Relationship Management Readiness.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001

Interoperability for Accessing DBs by E-Commerce Applications.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001

2000
A Step towards a Suite of E-commerce Benchmarks.
Proceedings of the Electronic Commerce and Web Technologies, 2000

1999
Developing Internet E-Commerce Benchmarks.
Inf. Syst., 1999

Making Business Sense of Electronic Commerce.
Computer, 1999

WebEC: A Benchmark for the Cybermediary Business Model in E-Commerce.
Proceedings of the Internet, Multimedia Systems and Applications, 1999

Locking with Different Granularities for Reads and Writes in an MVM System.
Proceedings of the 1999 International Database Engineering and Applications Symposium, 1999

WebTP: A Benchmark for Web-based Order Management Systems.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

Recoverable Virtual Memory through the Multi-View Memory Computer System.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

1998
Multi-View Memory Support to Operating Systems in Locking for Transaction and Database Systems.
Comput. J., 1998

A Benchmark Suite for Electronic Commerce.
Proceedings of WebNet 98, 1998

Architectural Support for Synchronization of Threads Accessing Variable-Sized Units of Virtual Memory.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1997
Improving applications performance: a memory model and cache architecture.
SIGARCH Comput. Archit. News, 1997

Multi-view Memory To Support OS Locking for Transaction Systems.
Proceedings of the International Database Engineering and Applications Symposium, 1997

1994
Multi-View Access Control Memory Computer System.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994

1993
Integrated Concurrency-Coherence Control in Distributed Shared Memory.
Proceedings of the Computing and Information, 1993


  Loading...