Results 1 to 10 of about 703,183 (313)

Measuring privacy leakage in term of Shannon entropy

open access: yesInternational Journal of Applied Sciences and Smart Technologies, 2019
Differential privacy is a privacy scheme in which a database is modified such that each users personal data are protected without affecting significantly the characteristics of the whole data.
Ricky Aditya, Boris Skoric
doaj   +1 more source

On Making Emerging Trusted Execution Environments Accessible to Developers

open access: yes, 2015
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions.
Asokan, N.   +2 more
core   +1 more source

Privacy self-regulation and the changing role of the state : from public law to social and technical mechanisms of governance [PDF]

open access: yes, 2007
This paper provides a structured overview of different self-governance mechanisms for privacy and data protection in the corporate world, with a special focus on Internet privacy.
Bendrath, Ralf
core  

Generating Privacy Stories From Software Documentation

open access: yes2025 IEEE 33rd International Requirements Engineering Conference (RE)
Research shows that analysts and developers consider privacy as a security concept or as an afterthought, which may lead to non-compliance and violation of users' privacy. Most current approaches, however, focus on extracting legal requirements from the regulations and evaluating the compliance of software and processes with them.
Baldwin, Wilder   +5 more
openaire   +2 more sources

Altered integrated and segregated states in cocaine use disorder

open access: yesFrontiers in Neuroscience
IntroductionCocaine use disorder (CUD) is a chronic brain condition that severely impairs cognitive function and behavioral control. The neural mechanisms underlying CUD, particularly its impact on brain integration–segregation dynamics, remain unclear ...
Yi Zheng   +23 more
doaj   +1 more source

Privacy as Product Safety [PDF]

open access: yes, 2010
Online social media confound many of our familiar expectaitons about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves.
Grimmelmann, James
core   +1 more source

Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign

open access: yes, 2020
Current day software development relies heavily on the use of service architectures and on agile iterative development methods to design, implement, and deploy systems. These practices result in systems made up of multiple services that introduce new data flows and evolving designs that escape the control of a single designer.
Kostova, Blagovesta   +2 more
openaire   +2 more sources

A Comprehensive Survey of Security and Privacy in UAV Systems

open access: yesIEEE Access
The proliferation of unmanned aerial vehicles (UAVs) across diverse applications, from photography to critical infrastructure inspection, has raised significant security and privacy challenges.
Bryce Cordill   +2 more
doaj   +1 more source

Privacy self-regulation and the changing role of the state: from public law to social and technical mechanisms of governance [PDF]

open access: yes
This paper provides a structured overview of different self-governance mechanisms for privacy and data protection in the corporate world, with a special focus on Internet privacy.
Bendrath, Ralf
core  

Home - About - Disclaimer - Privacy