|
|
|
|
|
Vasiliki Demertzi, Stavros Demertzis and Konstantinos Demertzis
The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancements have had a profound impact on the structures of numerous industrial o...
ver más
|
|
|
|
|
|
|
|
|
|
|
Karl van der Schyff, Greg Foster, Karen Renaud and Stephen Flowerday
Online users are responsible for protecting their online privacy themselves: the mantra is custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact that online users generally do not act to preserve the privacy of ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Dimitrios Papamartzivanos, Sofia Anna Menesidou, Panagiotis Gouvas and Thanassis Giannetsos
As the upsurge of information and communication technologies has become the foundation of all modern application domains, fueled by the unprecedented amount of data being processed and exchanged, besides security concerns, there are also pressing privacy...
ver más
|
|
|
|
|
|
|
|
|
|
|
Tomá? Sigmund
The article deals with the topic of attention paid to online privacy policy statements by university students. Privacy policy statements were originally intended to mitigate the users? privacy con-cerns and support trust, but users disregard them. The ar...
ver más
|
|
|
|
|
|
|
|
|
|
|
Raza Nowrozy, Khandakar Ahmed, Hua Wang and Timothy Mcintosh
This paper proposed a novel privacy model for Electronic Health Records (EHR) systems utilizing a conceptual privacy ontology and Machine Learning (ML) methodologies. It underscores the challenges currently faced by EHR systems such as balancing privacy ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Yan Yan, Zichao Sun, Adnan Mahmood, Fei Xu, Zhuoyue Dong and Quan Z. Sheng
Statistical partitioning and publishing is commonly used in location-based big data services to address queries such as the number of points of interest, available vehicles, traffic flows, infected patients, etc., within a certain range. Adding noise per...
ver más
|
|
|
|
|
|
|
|
|
|
|
Rene Meis and Maritta Heisel
Privacy is a software quality that is closely related to security. The main difference is that security properties aim at the protection of assets that are crucial for the considered system, and privacy aims at the protection of personal data that are pr...
ver más
|
|
|
|
|
|
|
|
|
|
|
Lothar Fritsch
This article speculates on the future of privacy and electronic identities on the Internet. Based on a short review of security models and the development of privacy-enhancing technology, privacy and electronic identities will be discussed as parts of a ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis and Stefanos Gritzalis
Social Networks (SNs) bring new types of privacy risks threats for users; which developers should be aware of when designing respective services. Aiming at safeguarding users? privacy more effectively within SNs, self-adaptive privacy preserving schemes ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Prathamesh Churi, Ambika Pawar and Antonio-José Moreno-Guerrero
Background: According to the renowned and Oscar award-winning American actor and film director Marlon Brando, ?privacy is not something that I am merely entitled to, it is an absolute prerequisite.? Privacy threats and data breaches occur daily, and coun...
ver más
|
|
|
|
|
|
|
|
|
|
|
Bin Cheng, Ping Chen, Xin Zhang, Keyu Fang, Xiaoli Qin and Wei Liu
With the rapid development of ubiquitous data collection and data analysis, data privacy in a recommended system is facing more and more challenges. Differential privacy technology can provide strict privacy protection while reducing the risk of privacy ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Suleyman Kardas,Serkan Celik,Mehmet Sariyuce,Albert Levi
Pág. 128 - 136
Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects. However, the messages that are transmitted over a insecure channel, ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Jingsha He, Yue Li and Nafei Zhu
Online social networks (OSNs) have experienced rapid growth in recent years, and an increasing number of people now use OSNs, such as Facebook and Twitter, to share and spread information on a daily basis. As a special type of information, user personal ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Abdul Majeed and Sungchang Lee
With the advent of the pandemic (e.g., novel corona virus disease 2019 (COVID-19)), a tremendous amount of data about individuals are collected by the health authorities on daily basis for curbing the disease?s spread. The individuals? data collection/pr...
ver más
|
|
|
|
|
|
|
|
|
|
|
Azizah Assiri and Hassen Sallay
Opportunistic mobile social networks (OMSNs) have become increasingly popular in recent years due to the rise of social media and smartphones. However, message forwarding and sharing social information through intermediary nodes on OMSNs raises privacy c...
ver más
|
|
|
|
|
|
|
|
|
|
|
Beibei Song, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu and Chuansheng Wang
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing th...
ver más
|
|
|
|
|
|
|
|
|
|
|
Tommy Nguyen, Garnet Yeates, Tony Ly and Umar Albalawi
With the recent increase in phishing attacks and other kinds of malicious activities, increasing the awareness of security and privacy awareness is arguably one of the best proven ways of preventing these kinds of threats. The main challenge in security ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Yang Yang and Guanghua Song
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing...
ver más
|
|
|
|
|
|
|
|
|
|
|
Suleiman Abahussein, Dayong Ye, Congcong Zhu, Zishuo Cheng, Umer Siddique and Sheng Shen
Online food delivery services today are considered an essential service that gets significant attention worldwide. Many companies and individuals are involved in this field as it offers good income and numerous jobs to the community. In this research, we...
ver más
|
|
|
|
|
|
|
|
|
|
|
Olha Drozd and Sabrina Kirrane
The General Data Protection Regulation (GDPR) identifies consent as one of the legal bases for personal data processing and requires that it should be freely given, specific, informed, unambiguous, understandable, and easily revocable. Unfortunately, cur...
ver más
|
|
|
|
|
|