A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Can Authoritative Governments Abuse the Right to Access?
[article]
2022
arXiv
pre-print
Our attacks highlight the need for strong procedures to authenticate subject access requests. ...
The right to access is a great tool provided by the GDPR to empower data subjects with their data. ...
They have created dashboard on their websites to let data subjects access their data. To access the dashboard, the data subject needs first to authenticate to the data controller websites. ...
arXiv:2203.02068v1
fatcat:x5howrzhnremdlgafhs7n4hmbq
Revisiting Identification Issues in GDPR 'Right Of Access' Policies: A Technical and Longitudinal Analysis
2022
Proceedings on Privacy Enhancing Technologies
Several data protection regulations permit individuals to request all personal information that an organization holds about them by utilizing Subject Access Requests (SARs). ...
Finally, we propose several technical modifications to SAR policies that reduce privacy and security risks of data controllers. ...
Finally, we thank the reviewers for their feedback and interesting discussions. ...
doi:10.2478/popets-2022-0037
fatcat:ml5yzplblbbl5b3qo7oejrn6gi
Comprehensive Survey and Research Directions on Blockchain IoT Access Control
2021
International Journal of Advanced Computer Science and Applications
This survey mainly discussed the core problems of Internet of things security and access control to unauthorized users and security requirements for IoT. ...
The authors also addressed how to use the Blockchain to work with and resolve some of the standards relevant to IoT security issues. ...
The authors in [16] suggested a new method of Authentication of access control and a user to make IoT secure and safe for illegal users and get open access to information. ...
doi:10.14569/ijacsa.2021.0120530
fatcat:kdpnrikixrbuxmg743zjnxk52e
A Secure CDM-Based Data Analysis Platform (SCAP) in Multi-Centered Distributed Setting
2021
Applied Sciences
Hospitals have their own database structures and maintain their data in a closed manner. For this reason, it is difficult for researchers outside of institutions to access multi-center data. ...
A secure CDM-based data analysis platform (SCAP) consists of a certificate authority (CA), authentication server (AS), code signer (CS), ticket-granting server (TGS), relaying server (RS), and service ...
While providing an automated CDM data analysis service, SCAP provides end-to-end authentication to users accessing the platform and the integrity of CDM data analysis codes. ...
doi:10.3390/app11199072
fatcat:arzgotouorbg7ivl66rmiztne4
Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment
2014
Journal of Applied Mathematics
Therefore, this paper suggests the authentication protocol to increase the security of the VTS systems using the main certification server and IVEF. ...
And IVEF (inter-VTS data exchange format) for inter-VTS network has become a hot research topic of VTS system. ...
Acknowledgments This paper is extended and improved from accepted paper of CSA 2012 conferences. ...
doi:10.1155/2014/734768
fatcat:h2dmv4xlxfcdrljc37eximjiuq
Migrating to Zero Trust Architecture: Reviews and Challenges
2021
Security and Communication Networks
Zero trust (ZT) is a new concept involving the provisioning of enterprise/organization resources to the subjects without relying on any implicit trust. ...
Also, challenges, steps, and things to consider when migrating from the legacy architecture to ZTA are presented and discussed. ...
Enterprises are expected to know what kind of data and resources they are holding, how they are protected, and who and when accessed these resources. ...
doi:10.1155/2021/9947347
fatcat:bergzmag5fddzgplxyegnmleke
Identifying Phishing Threats in Government Web Services
2012
International Journal of Information and Network Security (IJINS)
The governmental use of Web technologies, including e-Government, has many advantages for citizens, but progress in this relationship has highlighted information security as an important issue in preserving ...
Unfortunately, unique governmental characteristics lead users to authenticate its service unwillingly; users may investigate service's possible and likely vulnerabilities carelessly when perceiving trustworthiness ...
Some subjects asked how we obtained their resident registration number and were surprised that they were fooled by the date of birth data only. ...
doi:10.11591/ijins.v2i1.844
fatcat:fezn6mzcpjhkbmzzzwn43gksfy
Secure Development - Web Application Security
2013
IOSR Journal of Computer Engineering
This paper provides analysis of requirement of Secure Development and Web application security assessment mechanisms in order to identify poor coding practices that render Web applications vulnerable to ...
In addition, some risk can be avoided at the very beginning of the project life cycle when the requirements for the system are defined. ...
This causes the value to be sent in the body of the HTTP request, avoiding its inclusion in the URL, which is subject to exposure. 2. ...
doi:10.9790/0661-1461422
fatcat:rzvxmvyd7nbb3iiqqmgzv2bk6q
How do app vendors respond to subject access requests?
2020
Proceedings of the 15th International Conference on Availability, Reliability and Security
In a first-of-itskind longitudinal study, we examine how service providers have complied with subject access requests over four years. ...
In three iterations between 2015 and 2019, we sent subject access requests to vendors of 225 mobile apps popular in Germany. ...
This includes, in particular, guidance on how to authenticate data subjects safely [4, 7, 25] , how to transfer personal data [42] , and how to facilitate the submission of requests [2, 10, 17] . ...
doi:10.1145/3407023.3407057
dblp:conf/IEEEares/KrogerLH20
fatcat:cfu7me54wzh3rfo6kkmxzbvwti
Text/Conference Paper
2019
Jahrestagung der Gesellschaft für Informatik
to ascertain how a more granular security structure with ABAC could provide additional security advantages for industry. ...
Of particular interest is the security services offered by OPC UA, as they are expected to strengthen the security posture of industrial automation systems, which have so far suffered a number of sophisticated ...
Acknowledgements Some of the addressed topics are being elaborated as part of Framatome GmbH's participation in the WIPANO R&D (2018-2020) with Universität Siegen. ...
doi:10.18420/inf2019_ws34
dblp:conf/gi/WatsonSW19
fatcat:p242fwmt6jhgrdjcv5wl2pgpda
An Empirical Study of a Trustworthy Cloud Common Data Model Using Decentralized Identifiers
2021
Applied Sciences
In this paper, we propose a DID (Decentralized Identifier)-based cloud CDM that allows researchers to securely store medical research information by authenticating their identity and to access the CDM ...
Prototypes built for agent-based proof of concept (PoC) are leveraged to enhance security for researcher use of ophthalmic CDM data. ...
RE202101551, the development of IoT-based technology for collecting and managing big data on environmental hazards and health effects. ...
doi:10.3390/app11198984
fatcat:aaktlzjypvgwxmbbnrrotbmyju
DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases
2016
EURASIP Journal on Information Security
The trend of cloud databases is leaning towards Not Only SQL (NoSQL) databases as they provide better support for scalable storage and quick retrieval of exponentially voluminous data. ...
However, there are inherent security issues in cloud, including remote data residency along with the non-existent control of owners over their own data. ...
Using the DB-SECaaS system, enterprises can host their critical data in document-based NoSQL databases on the cloud securely, where the owner of the data would be able to control access to their data. ...
doi:10.1186/s13635-016-0040-5
fatcat:ove7mr5rrrhotjlw2n752msp3y
A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe
2015
2015 IEEE Trustcom/BigDataSE/ISPA
This paper provides a condensed description of MaidSafe's key protocol mechanisms, derives the underlying identity and access management architecture, and evaluates it with respect to security and privacy ...
trust are on their rise. ...
MAIDSAFE The SAFE network (or MaidSafe) refers to Secure Access For Everyone and is described by their authors as a fully distributed data management service that offers secure data storage and secure ...
doi:10.1109/trustcom.2015.538
dblp:conf/trustcom/JacobMH15
fatcat:wxwsnltq4zbuhchupndlhbrwx4
Corbel Report On Models And Pilot Designs For Sustainable Scalable Cloud-Based Provision Of Data Access And Compute Across Infrastructures
2017
Zenodo
Task 3 in Work Package 6 addresses the secure data management and compute needs of service providers dealing with data that needs to be access controlled, for example human identifiable data such as genome ...
Therefore we have first surveyed use cases and needs of BMS infrastructures and their users. Subsequently we surveyed existing models for the provisioning of data access and compute. ...
Or alternatively, when multiple BMS data providers want to pool their data they also need to sent their data to IT services hosted by a third party. ...
doi:10.5281/zenodo.376279
fatcat:qrwc2azvjzgl5iqt6swa65bo2m
A Study on Distributed Processing of Big Data and User Authentication for Human-friendly Robot Service on Smartphone
인간 친화적 로봇 서비스를 위한 대용량 분산 처리 기술 및 사용자 인증에 관한 연구
2014
Journal of Internet Computing and services
인간 친화적 로봇 서비스를 위한 대용량 분산 처리 기술 및 사용자 인증에 관한 연구
The enterprises and nations are actively underway of the business process using mobile cloud computing and they are aware of need for implementing mobile cloud computing to their business practice, but ...
We will also be able to study how to process and analyze unstructured data in parallel to this model, so that in the future, providing customized information for individuals may be possible using unstructured ...
Step by step procedure for granting authority to access public document and real-time event processing is as follows. ① Access of public document (source data): Authority to access public document is set ...
doi:10.7472/jksii.2014.15.1.55
fatcat:3vox7d7mt5ddfp26t6tpqvbgm4
« Previous
Showing results 1 — 15 out of 26,220 results