Results 1 to 10 of about 643,939 (333)
Principles for privacy protection software [PDF]
The privacy impact of computer systems is clearly a hot topic in the mainstream press [10] and the research world [1]. Experience with systems that protect privacy and others that violate it provides an opportunity to evaluate issues raised by current tools and proposed designs. Study of the strengths and shortcomings of existing tools can help clarify
Harry Hochheiser
openalex +4 more sources
Privacy-Invasive Software in Filesharing Tools [PDF]
Personal privacy is affected by the occurrence of adware and spyware in peertopeer tools. In an experiment, we investigated five file-sharing tools and found that they all contained ad-/spyware programs, and, that these hidden components communicated with several servers on the Internet.
Andreas Jacobsson+2 more
openalex +4 more sources
A Privacy-Aware V-Model for Software Development [PDF]
After the adoption of new data protection regulations, like GDPR, proper treatment of privacy throughout the system development lifecycle has become a must. In this paper, we discuss several aspects to more easily and effectively integrate privacy engineering in system development and how to bring the notion of privacy-by-design into practice.
Ala’a M. Al-Momani+4 more
openalex +3 more sources
Is Data Privacy Always Good for Software Testing? [PDF]
Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order to achieve lower cost and higher quality. When releasing proprietary DCAs, its databases should also be made available to test engineers, so that they can test using real data ...
Mark Grechanik+3 more
openalex +3 more sources
Proposal of a Privacy Knowledge Base for Supporting Development of Privacy Friendly Software
Abstract With the spread of highly functional mobile devices, anyone can send messages in a simple manner. On the other hand, risks regarding the leakage of privacy information have increased in number. Software engineers must prevent the leakage of privacy information caused by problems of software systems.
Atsuo Hazeyama
openalex +3 more sources
New Privacy Practices for Blockchain Software [PDF]
In this article, we present the software tools we have implemented to bring complex privacy technologies closer to developers and to facilitate the implementation of privacyenabled blockchain applications.
Bellés Muñoz, Marta+3 more
openaire +5 more sources
Assessing software privacy using the privacy flow-graph
We increasingly rely on digital services and the conveniences they provide. Processing of personal data is integral to such services and thus privacy and data protection are a growing concern, and governments have responded with regulations such as the EU's GDPR.
Tang, Feiyang, Østvold, Bjarte M.
openaire +2 more sources
Privacy violations in online social networks (OSNs) often arise as a result of users sharing information with unintended audiences. One reason for this is that, although OSN capabilities for creating and managing social groups can make it easier to be selective about recipients of a given post, they do not provide enough guidance to the users to make ...
Calikli, Gul+8 more
openaire +2 more sources
Software Engineering for Privacy in-the-Large [PDF]
There will be an estimated 35 zettabytes (35$\times$10\textsuperscript{21}) of digital records worldwide by the year 2020. This effectively amounts to privacy management on an ultra-large-scale. In this briefing, we discuss the privacy challenges posed by such an ultra-large-scale ecosystem - we term this ``Privacy in the Large''.
Anthonysamy, Pauline, Rashid, Awais
openaire +3 more sources
On Privacy Weaknesses and Vulnerabilities in Software Systems
In this digital era, our privacy is under constant threat as our personal data and traceable online/offline activities are frequently collected, processed and transferred by many software applications. Privacy attacks are often formed by exploiting vulnerabilities found in those software applications.
Sangaroonsilp, Pattaraporn+2 more
openaire +3 more sources