Results 1 to 10 of about 643,939 (333)

Principles for privacy protection software [PDF]

open access: bronzeProceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions, 2000
The privacy impact of computer systems is clearly a hot topic in the mainstream press [10] and the research world [1]. Experience with systems that protect privacy and others that violate it provides an opportunity to evaluate issues raised by current tools and proposed designs. Study of the strengths and shortcomings of existing tools can help clarify
Harry Hochheiser
openalex   +4 more sources

Privacy-Invasive Software in Filesharing Tools [PDF]

open access: bronze, 2006
Personal privacy is affected by the occurrence of adware and spyware in peertopeer tools. In an experiment, we investigated five file-sharing tools and found that they all contained ad-/spyware programs, and, that these hidden components communicated with several servers on the Internet.
Andreas Jacobsson   +2 more
openalex   +4 more sources

A Privacy-Aware V-Model for Software Development [PDF]

open access: bronze2019 IEEE Security and Privacy Workshops (SPW), 2019
After the adoption of new data protection regulations, like GDPR, proper treatment of privacy throughout the system development lifecycle has become a must. In this paper, we discuss several aspects to more easily and effectively integrate privacy engineering in system development and how to bring the notion of privacy-by-design into practice.
Ala’a M. Al-Momani   +4 more
openalex   +3 more sources

Is Data Privacy Always Good for Software Testing? [PDF]

open access: green2010 IEEE 21st International Symposium on Software Reliability Engineering, 2010
Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order to achieve lower cost and higher quality. When releasing proprietary DCAs, its databases should also be made available to test engineers, so that they can test using real data ...
Mark Grechanik   +3 more
openalex   +3 more sources

Proposal of a Privacy Knowledge Base for Supporting Development of Privacy Friendly Software

open access: goldProcedia Computer Science, 2020
Abstract With the spread of highly functional mobile devices, anyone can send messages in a simple manner. On the other hand, risks regarding the leakage of privacy information have increased in number. Software engineers must prevent the leakage of privacy information caused by problems of software systems.
Atsuo Hazeyama
openalex   +3 more sources

New Privacy Practices for Blockchain Software [PDF]

open access: yesIEEE Software, 2022
In this article, we present the software tools we have implemented to bring complex privacy technologies closer to developers and to facilitate the implementation of privacyenabled blockchain applications.
Bellés Muñoz, Marta   +3 more
openaire   +5 more sources

Assessing software privacy using the privacy flow-graph

open access: yesProceedings of the 1st International Workshop on Mining Software Repositories Applications for Privacy and Security, 2022
We increasingly rely on digital services and the conveniences they provide. Processing of personal data is integral to such services and thus privacy and data protection are a growing concern, and governments have responded with regulations such as the EU's GDPR.
Tang, Feiyang, Østvold, Bjarte M.
openaire   +2 more sources

Privacy dynamics [PDF]

open access: yesProceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016
Privacy violations in online social networks (OSNs) often arise as a result of users sharing information with unintended audiences. One reason for this is that, although OSN capabilities for creating and managing social groups can make it easier to be selective about recipients of a given post, they do not provide enough guidance to the users to make ...
Calikli, Gul   +8 more
openaire   +2 more sources

Software Engineering for Privacy in-the-Large [PDF]

open access: yes2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, 2015
There will be an estimated 35 zettabytes (35$\times$10\textsuperscript{21}) of digital records worldwide by the year 2020. This effectively amounts to privacy management on an ultra-large-scale. In this briefing, we discuss the privacy challenges posed by such an ultra-large-scale ecosystem - we term this ``Privacy in the Large''.
Anthonysamy, Pauline, Rashid, Awais
openaire   +3 more sources

On Privacy Weaknesses and Vulnerabilities in Software Systems

open access: yes2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), 2023
In this digital era, our privacy is under constant threat as our personal data and traceable online/offline activities are frequently collected, processed and transferred by many software applications. Privacy attacks are often formed by exploiting vulnerabilities found in those software applications.
Sangaroonsilp, Pattaraporn   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy