Filters








63,768 Hits in 3.5 sec

Privacy-Aware Infrastructure for Managing Personal Data

Yousef Amar, Hamed Haddadi, Richard Mortier
2016 Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference - SIGCOMM '16  
The Databox seeks to enable all the advantages of personal data analytics while at the same time enforcing accountability and control in order to protect a user's privacy.  ...  In recent times, we have seen a proliferation of personal data.  ...  It solves this need for privacy by enforcing accountability and control by design, and provides a means for users to collate, curate, and mediate their personal data.  ... 
doi:10.1145/2934872.2959054 dblp:conf/sigcomm/AmarHM16 fatcat:lisjtahrrvda5nei777ypkhix4

Internet of Everything (Ioe): Analysing the Individual Concerns Over Privacy Enhancing Technologies (Pets)

Asim Majeed, Rehan Bhana, Anwar Ul, Imani Kyaruzi, Shaheed Pervaz, Mike-Lloyd Williams
2016 International Journal of Advanced Computer Science and Applications  
Modern organisations use consent forms to gather individual's sensitive personal information for a specific purpose.  ...  The infrastructure of ICT should be developed in alliance with the privacy laws and made compliant as well intelligent which learn by itself from the environment.  ...  Various researchers have studied PETs from different security aspects expressing the privacy possibilities for data management aiming to avoid the personal data breach through ICTs.  ... 
doi:10.14569/ijacsa.2016.070303 fatcat:avugxnij4ffzhaeq3ctu3bve6q

Building Infrastructure Support for Ubiquitous Context-Aware Systems [chapter]

Wei Li, Martin Jonsson, Fredrik Kilander, Carl Gustaf Jansson
2004 Lecture Notes in Computer Science  
A person-centric service infrastructure is proposed together with a context-aware call forwarding system constructed as a proof-of-concept prototype based on the Session Initiation Protocol (SIP).  ...  Many context-aware systems have been demonstrated in lab environments; however, due to some difficulties such as the scalability and privacy issues, they are not yet practical for deployment on a large  ...  The Context Manager in a Personal Server may also employ a Presence Agent for sharing personal context with PSIs or other users.  ... 
doi:10.1007/978-3-540-30566-8_61 fatcat:ffhpbf6efjb6pnf3rt7antaoua

GDPR Compliance in the Context of Continuous Integration [article]

Ze Shi Li, Colin Werner, Neil Ernst, Daniela Damian
2020 arXiv   pre-print
The enactment of the General Data Protection Regulation (GDPR) in 2018 forced any organization that collects and/or processes EU-based personal data to comply with stringent privacy regulations.  ...  This design science approach resulted in four implications for research and for practice.  ...  ACKNOWLEDGMENTS The authors would like to thank the employees and collaborators at DataCorp for their time and effort in working with our research team.  ... 
arXiv:2002.06830v1 fatcat:nx5yoovxrnanfc6c363ahl25we

Ensuring Security and Privacy for Cloud-based E-Services

Khadijah M., Fahd S.
2016 International Journal of Computer Applications  
The aim of this paper is to illustrate those applications and the main challenges that face the adaptation of Cloud Computing, which are mainly privacy and security issues, and what can be done to solve  ...  Despite the big role of cloud providers' responsibility, customers and users of the cloud also need to be aware of their information security and privacy. Awareness is the best data protection.  ...  • Collecting personal information, where can be resulting from impersonal data through applications that can collect and assemble personal information. • Small data considered as the offender for most  ... 
doi:10.5120/ijca2016911597 fatcat:4bkoc6wuxzddvn4dokhfp4ss7e

Privacy-enhancing identity management

Marit Hansen, Peter Berlich, Jan Camenisch, Sebastian Clauß, Andreas Pfitzmann, Michael Waidner
2004 Information Security Technical Report  
Thus there is a need for new systems to be designed and built into the infrastructure.  ...  Through the secure and authenticated use of pseudonyms, accountability of an individual for his or her actions can be achieved without giving away personal data.  ...  Design of an IMS: Requirements and Functionality A privacy-enhancing IMS makes the user aware of and gives him/her control over the flow of personal data.  ... 
doi:10.1016/s1363-4127(04)00014-7 fatcat:c6ga2thbtfdebi7lraonqgvk4i

Dynamic privacy management

Dan Hong, Mingxuan Yuan, Vincent Y. Shen
2005 Proceedings of the 7th international conference on Human computer interaction with mobile devices & services - MobileHCI '05  
Therefore, data privacy protection becomes one of the major issues for context-aware applications.  ...  We also propose a privacy infrastructure, which could be installed as a plug-in service for middleware supporting context-aware applications.  ...  Acknowledgements This research was supported in part by Sino Software Research Institute grant SSRI01/02.EG14, "W3C Office" and by Research Grant Council grant AOE/E-01/99, "Information Technology for  ... 
doi:10.1145/1085777.1085779 dblp:conf/mhci/HongYS05 fatcat:ebq7hu4jovganb5rzlaqh3yzcq

AN INTEGRATED APPROACH TO USER-CENTERED PRIVACY FOR MOBILE INFORMATION SERVICES

Leonid Titkov, Stefan Poslad, Juan Jim Tan
2006 Applied Artificial Intelligence  
Agent-Based Context-Aware Service Infrastructure An example of an agent-based infrastructure to support context-awareness is the CRUMPET (Creation of User-friendly Mobile Services PErsonalized for Tourism  ...  Survey of Privacy-Enabled Context-Aware Service Infrastructures 185 Our survey focuses primarily on agent-based context-aware service infrastructures.  ... 
doi:10.1080/08839510500484181 fatcat:yooszbw5drbapghkxr3p7ocpj4

Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System [chapter]

Annanda Thavymony Rath, Jean-Noël Colin
2015 Lecture Notes in Computer Science  
In this paper, we address the issues of personal data protection for privacy preserving perimeter protection system, particularly, the access control for real-time data streamed from surveillance tools  ...  and also for data stored in facility's storage.  ...  There are three modules, in the proposed architecture, which ensure privacy preservation and personal data protection: (1) Privacy-aware access control module (PACM) is responsible for controlling access  ... 
doi:10.1007/978-3-319-20810-7_16 fatcat:mb3skewosjeezfx3gqlxlua57y

E-government Implementation in Developing Countries: A Literature Review

Esam Mohamed El gohary
2019 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
So governments in developing countries have to focus on these five categories and seeking for treat them  ...  Recently, due to the numerous benefits of e-government implementation, so it becomes inevitable for both developed and developing countries.  ...  The comprehensive privacy policy should specify the citizens' rights to privacy and mandate that personal data are collected and processed only for legitimate purposes (Shareef et al., 2011).  ... 
doi:10.24297/ijct.v16i1.8371 fatcat:wtmd3kp7ujbntnispx5rw3zlji

Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds

Ivona Brandic, Schahram Dustdar, Tobias Anstett, David Schumm, Frank Leymann, Ralf Konrad
2010 2010 IEEE 3rd International Conference on Cloud Computing  
We underpin our approach with a use case discussing various techniques necessary for achieving security, privacy, and trust in Clouds as for example data fragmentation among different protection domains  ...  ., service availability or throughput, there is lack of adequate mechanisms for guaranteeing certifiable and auditable security, trust, and privacy of the applications and the data they process.  ...  Another provider could be responsible for storing or processing personal data. C.  ... 
doi:10.1109/cloud.2010.42 dblp:conf/IEEEcloud/BrandicDASLK10 fatcat:jxarf62c6zb5feq7fo52jl75jq

A Privacy Agent in Context-Aware Ubiquitous Computing Environments [chapter]

Ni Zhang, Chris Todd
2006 Lecture Notes in Computer Science  
This paper targets personal privacy protection in context-aware ubiquitous computing environments.  ...  The development of privacy agent is an integrated part of our ongoing effort towards developing a privacy-respecting context-aware infrastructure.  ...  The Data element specified in the Privacy Rule Ontology represents sensitive personal information that asks for privacy protection.  ... 
doi:10.1007/11909033_18 fatcat:pikim2iopfbgzh67qqlurj737q

Security, Privacy and Trust Challenges in Cloud Computing and Solutions

Seyyed Yasser hashemi, Parisa Sheykhi Hesarlo
2014 International Journal of Computer Network and Information Security  
IT managers look to cloud computing as a means to maintain a flexible and scalable IT infrastructure that enables business agility.  ...  Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort  ...  Personal encryption method Preparations of highly personalized service for data encryption that even the service providers are not aware of them. P.  ... 
doi:10.5815/ijcnis.2014.08.05 fatcat:2k55llrywfh4flvf4yrupumvtq

Towards Privacy-Aware Handling of Authorizations

Wolfgang Dobmeier, Gunther Pernul
2007 Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)  
This also applies to authorizations which suffer from privacy problems when stored and processed centrally. We present first steps towards a framework of privacy-aware handling of authorizations.  ...  We illustrate our approach at the example of a security infrastructure scenario.  ...  We will also investigate privacy-aware generation and storage of audit data in security infrastructures.  ... 
doi:10.1109/policy.2007.47 dblp:conf/policy/DobmeierP07 fatcat:qjp2r6atabgpjmpquvnh74ntei

An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control [chapter]

Michael Netter, Sabri Hassan, Günther Pernul
2012 Lecture Notes in Computer Science  
For this purpose, we first propose Priamos, an architecture for privacy-preserving autonomous management of social identities and subsequently present one of its core components to realize contextaware  ...  The rise of online social networks (OSNs) has traditionally been accompanied by privacy concerns.  ...  to personal data.  ... 
doi:10.1007/978-3-642-32287-7_6 fatcat:lmqri3jxbfbwjm5g4bxdd3oqpq
« Previous Showing results 1 — 15 out of 63,768 results