Results 41 to 50 of about 1,097,797 (367)
Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel +3 more
core +2 more sources
Privacy-aware mechanism design [PDF]
In traditional mechanism design, agents only care about the utility they derive from the outcome of the mechanism. We look at a richer model where agents also assign non-negative dis-utility to the information about their private types leaked by the outcome of the mechanism.
Nissim, K. +2 more
openaire +2 more sources
Privacy requirements engineering is a crucial aspect of privacy engineering. It aims to integrate privacy principles into organizational and technical processes throughout the software development lifecycle.
Guntur Budi Herwanto +3 more
doaj +1 more source
L’identità digitale nel metaverso [PDF]
The essay analyses and explores the concept of personal identity in the light not only of the already tested digital dimension but also of a further evolution of the Internet represented by the so-called metaverse to be understood as a convergence zone ...
Michele Iaselli
doaj
Privacy Compliance System by Design Platforms: A Case of Privacy Concerns for Thai Teenagers
The concern over privacy is growing, and several attempts have been made to address privacy invasion and suggest privacy ethics in technology design. However, users' privacy is still customized by the technology around them.
Saranya Saetang
doaj +1 more source
Privacy Architectures: Reasoning About Data Minimisation and Integrity [PDF]
Privacy by design will become a legal obligation in the European Community if the Data Protection Regulation eventually gets adopted. However, taking into account privacy requirements in the design of a system is a challenging task.
C. Diaz +20 more
core +4 more sources
This article argues that the self-management of one’s privacy is impossible due to privacy externalities. Privacy externalities are the negative by-product of the services offered by some data controllers, whereby the price to ‘pay’ for a service ...
Simeon de Brouwer
doaj +1 more source
PharmaLedger: Blockchain-Enabled Healthcare: Privacy-Enhancement with Blockchain
Topics such as supply chain, clinical trials and health data will be explored along with how blockchian can exist in harmony with GDPR.
Halid Kayhan, Co-lead for Regulatory, Legal and Data Privacy Framework, PharmaLedger
doaj +1 more source
Privacy Games: Optimal User-Centric Data Obfuscation
In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of differential privacy (indistinguishability) and distortion privacy ...
Shokri, Reza
core +2 more sources
Reusable Elements for the Systematic Design of Privacy-Friendly Information Systems: A Mapping Study
Privacy by design is a new paradigm that promotes embedding privacy considerations throughout the development of information systems, to protect user privacy. Privacy engineering is the nascent field of research and practice that aims to realize this new
Julio C. Caiza +4 more
doaj +1 more source

