13,595 Hits in 10.2 sec

Flexible control of downloaded executable content

Trent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam
1999 ACM Transactions on Privacy and Security  
We detail a system architecture that uses this access control model to implement secure collaborative applications.  ...  In this paper, we define an access control model with the following properties: (1) system administrators can define system access control requirements on applications and (2) application developers can  ...  We also thank colleagues with whom we had the pleasure of several discussions and, with some, of collaboration, including Ed Felten, Li Gong, Peter Honeyman, Avi Rubin, and Dan Wallach.  ... 
doi:10.1145/317087.317091 fatcat:2azgrvjrvfdqdbakrfn6zkg2aq

Healthcare Privacy [chapter]

Vivian Genaro Motti, Shlomo Berkovsky
2022 Modern Socio-Technical Perspectives on Privacy  
To ensure patients' privacy, collaborative efforts from stakeholders are necessary.  ...  Privacy-preserving mechanisms go beyond the protection of patients' data to the infrastructure of medical devices, networks, and systems.  ...  First, the data sources that could pose privacy risks include systems and applications that manage protected medical data.  ... 
doi:10.1007/978-3-030-82786-1_10 fatcat:thw3rmvewrbwjiznkhhrha63by

The Identity Crisis. Security, Privacy and Usability Issues in Identity Management [article]

Gergely Alpár, Jaap-Henk Hoepman, Johanneke Siljee
2011 arXiv   pre-print
This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management.  ...  This paper brings them together in a single, comprehensive study and proposes recommendations to resolve or to mitigate the problems.  ...  Depending on the application, a RP may rely on an IdP to provide him with attributes regarding the user accessing the service.  ... 
arXiv:1101.0427v1 fatcat:hkyeuw325nbbtjrkkasphlaqxy

Privacy-preserving COVID-19 contact tracing using blockchain

Shahzaib Tahir, Hasan Tahir, Ali Sajjad, Muttukrishnan Rajarajan, Fawad Khan
2021 Journal of Communications and Networks  
With technological advancements, several mechanisms and mobile applications have been developed that attempt to trace the physical contact made by a person with someone who has been tested COVID-19 positive  ...  The proposed architecture preserves the privacy of individuals and their contact history by encrypting all the data specific to an individual using a privacy-preserving Homomorphic encryption scheme and  ...  ACKNOWLEDGMENT This work was done collaboratively by the Information Security and Privacy Lab, NUST supported by the National Centre for Cyber Security, Pakistan, under the project titled "Privacy Preserving  ... 
doi:10.23919/jcn.2021.000031 fatcat:3piwznmwsrea7pqker33f37ose

Certificate-based authorization policy in a PKI environment

Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai
2003 ACM Transactions on Privacy and Security  
As part of an effort to use X.509 identities to provide authorization in highly distributed environments, we have developed and deployed an authorization service based on X.509 identified users and access  ...  The major goal of this system, called Akenti, is to produce a usable authorization system for an environment consisting of distributed resources used by geographically and administratively distributed  ...  Case Larsen did a large part of the original implementation. Wille Chin, Maria Kulick, Guillaume Farret, and Xiang Sun have also contributed to the current implementation.  ... 
doi:10.1145/950191.950196 fatcat:k2fknfga45c5zcskeka3jyml2y

Crowdsensing and privacy in smart city applications [article]

Raj Gaire, Ratan K. Ghosh, Jongkil Kim, Alexander Krumpholz, Rajiv Ranjan, R.K. Shyamasundar, Surya Nepal
2018 arXiv   pre-print
However, involving people brings of the risk of exposing their private information.This chapter explores crowdsensing in smart city applications and its privacy implications.  ...  Smartness in smart cities is achieved by sensing phenomena of interest and using them to make smart decisions.  ...  Combined with proper access control mechanisms, those information flow model can be used to guarantee that the information flow follows the required privacy rules and does not leak any critical information  ... 
arXiv:1806.07534v1 fatcat:2xzudp4qybdmxccseeviabnsf4

Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks

Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis, Stefanos Gritzalis
2021 Future Internet  
The study was based on an interdisciplinary research instrument, adopting constructs and metrics from both sociological and privacy literature.  ...  The results of the survey lead to a pilot taxonomic analysis for self-adaptive privacy within SNs and to the proposal of specific privacy related requirements that should be considered for this domain.  ...  about users' social attributes and privacy management within SNs.  ... 
doi:10.3390/fi13020023 fatcat:tff6ifbptnbivlpjan4adktscq

Managing and accessing data in the cloud: Privacy risks and approaches

Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
2012 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)  
A cloud infrastructure offers several advantages to users since they can easily share and store data in a reliable system, and can have  ...  to such an information.  ...  ACKNOWLEDGMENTS The paper is based on joint work with Claudio A. Ardagna, Sushil Jajodia, Gerado Pelosi, and Stefano Paraboschi.  ... 
doi:10.1109/crisis.2012.6378956 dblp:conf/crisis/VimercatiFS12 fatcat:iostep5swbac3owyhskrs3oi24

Privacy and Emergency Payments in a Pandemic: How to Think about Privacy and a Central Bank Digital Currency

Ellie Rennie, Stacey Steele
2021 Law, Technology and Humans  
We identify and categorize four key privacy risks as 'losses' associated with current CBDC models: loss of anonymity, loss of liberty, loss of individual control, and loss of regulatory control.  ...  Priorities including preventing the criminal abuse of the financial system, geopolitical concerns and private sector innovation compete with, and potentially undermine, privacy.  ...  Acknowledgements The authors thank the reviewers for their helpful comments and Dr Geraldine Carney, University of Melbourne, and Mr Campbell McNolty, RMIT University, for their research assistance.  ... 
doi:10.5204/lthj.1745 fatcat:tmhc2eeh3zecba26um4r72cxuy

The Cloud: Understanding the Security, Privacy and Trust Challenges

Neil Robinson, Lorenzo Valeri, Jonathan Cave, Tony Starkey, Hans Graux, Sadie Creese, Paul P. Hopkins
2010 Social Science Research Network  
his engagement with the study and moderated the expert workshop.  ...  Project Officers Bart van Caenegem, Valeria Bricola and Mario Scillia from the European Commission, Directorate-General Information Society and Media Unit F.5 (Trust and Security) for their helpful and  ...  Acknowledgements The authors would like to thank Marjory Blumenthal (RAND Corporation / Georgetown University), Simone Vernacchia (Rome), Marco Casassa Mont (HP Labs, Bristol) and  ... 
doi:10.2139/ssrn.2141970 fatcat:djodoaep2zaxdppfueavfx5cle

Repacking 'Privacy' for a Networked World

Andy Crabtree, Peter Tolmie, Will Knight
2017 Computer Supported Cooperative Work (CSCW)  
managing their relationships in and with the networked world.  ...  of digital content, and the controls they exercise over the extent to which the online world at large can penetrate their everyday lives.  ...  Acknowledgements This work was supported by the Engineering and Physical Sciences Research Council [grants EP/M001636/1 and EP/N028260/1].  ... 
doi:10.1007/s10606-017-9276-y pmid:32025101 pmcid:PMC6979540 fatcat:lvx6nw3fg5axth6y3yjrs7idby

Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions

David Eckhoff, Isabel Wagner
2018 IEEE Communications Surveys and Tutorials  
Smart cities rely on a large number of application areas and technologies to realize complex interactions between citizens, third parties, and city departments.  ...  To prevent this, we believe that a better understanding of smart cities and their privacy implications is needed.  ...  ACKNOWLEDGMENT We would like to thank the anonymous reviewers for their insightful and in-depth comments which have helped to greatly improve the paper.  ... 
doi:10.1109/comst.2017.2748998 fatcat:q2iwcfkjevgrpe7vjxt5ugvrjy

A Digital Currency Architecture for Privacy and Owner-Custodianship [article]

Geoffrey Goodell, Hazem Danny Al-Nakib, Paolo Tasca
2021 arXiv   pre-print
Our approach to digital currency can also facilitate more efficient and transparent clearing, settlement, and management of systemic risk.  ...  We argue that our system can restore and preserve the salient features of cash, including privacy, owner-custodianship, fungibility, and accessibility, while also preserving fractional reserve banking  ...  We also acknowledge the support of the Centre for Blockchain Technologies at University College London, the Centre for Technology and Global Affairs at the University of Oxford, and the Systemic Risk Centre  ... 
arXiv:2101.05259v5 fatcat:cszlj7b7q5b53oepxjdrxhxoye


Phan Duong Hieu, Moti Yung
2021 Journal of Computer Science and Cybernetics  
In a general sense, privacy is "the right to be left alone" and privacy protection allows individuals to have control over how their personal information is collected and used.  ...  Privacy, therefore, becomes more and more important, and new techniques should be developed to protect personal information and to reduce trust requirements on the authorities or the Big Tech providers  ...  Identity Based Encryption (IBE) and Attribute-Based Encryption (ABE).  ... 
doi:10.15625/1813-9663/37/4/16104 fatcat:o7mu4ht5uneadncuyouedgs7nq

Organizational Design and Alignment [chapter]

Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran
2014 The Privacy Engineer's Manifesto  
It is impossible to control access to data stored in IT systems if those systems and their physical environment are not adequately secured.  ...  Because privacy requirements impact every area within the organization that collects, accesses, or uses consumer data, a broad-based governance model is key to increased awareness and acceptance, as well  ... 
doi:10.1007/978-1-4302-6356-2_12 fatcat:sa6qittv2natxczc6kc6ywl64a
« Previous Showing results 1 — 15 out of 13,595 results