Results 11 to 20 of about 667,722 (335)

Designing a Serious Game: Teaching Developers to Embed Privacy into Software Systems [PDF]

open access: yes35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW '20), September 25, 2020, Virtual Event, Australia. ACM, New York, NY, USA, 2020
Software applications continue to challenge user privacy when users interact with them. Privacy practices (e.g. Data Minimisation (DM), Privacy by Design (PbD) or General Data Protection Regulation (GDPR)) and related "privacy engineering" methodologies exist and provide clear instructions for developers to implement privacy into software systems they ...
Amagir Aisa   +17 more
arxiv   +3 more sources

Advanced Cloud Privacy Threat Modeling [PDF]

open access: yes, 2016
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system .
Gholami, Ali, Laure, Erwin
arxiv   +3 more sources

Mobile App Privacy in Software Engineering Research: A Systematic Mapping Study [PDF]

open access: greenarXiv, 2019
Mobile applications (apps) have become deeply personal, constantly demanding access to privacy-sensitive information in exchange for more personalized user experiences. Such privacy-invading practices have generated major multidimensional and unconventional privacy concerns among app users.
Fahimeh Ebrahimi   +2 more
arxiv   +3 more sources

Privacy in Social Software [PDF]

open access: yes, 2011
While using social software and interacting with others on the Internet, users share a lot of information about themselves. An important issue for these users is maintaining control over their own personal data and being aware to whom which data is disclosed. In this chapter, we present specific requirements and realised solutions to these problems for
Filipe Beato   +4 more
openaire   +5 more sources

Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams [PDF]

open access: greenhttps://www.usenix.org/conference/soups2024/presentation/prybylo
With the increase in the number of privacy regulations, small development teams are forced to make privacy decisions on their own. In this paper, we conduct a mixed-method survey study, including statistical and qualitative analysis, to evaluate the privacy perceptions, practices, and knowledge of members involved in various phases of the Software ...
Maxwell Prybylo   +3 more
arxiv   +3 more sources

SoK: Demystifying Privacy Enhancing Technologies Through the Lens of Software Developers [PDF]

open access: yesarXiv, 2023
In the absence of data protection measures, software applications lead to privacy breaches, posing threats to end-users and software organisations. Privacy Enhancing Technologies (PETs) are technical measures that protect personal data, thus minimising such privacy breaches.
Arachchilage, Nalin Asanka Gamagedara   +3 more
arxiv   +2 more sources

Design a Software Reference Architecture to Enhance Privacy and Security in Electronic Health Records

open access: goldIEEE Access
Healthcare services and organizations rely on Electronic Health Records (EHRs) to manage, store, and transmit patient data records. Consequently, EHRs play a crucial role in providing high-quality services and maintaining the privacy and security of ...
Rodrigo Tertulino   +2 more
doaj   +2 more sources

New Privacy Practices for Blockchain Software [PDF]

open access: yesIEEE Software, 2022
The benefits of blockchain technologies for industrial applications are unquestionable. However, it is a considerable challenge to use a transparent system like blockchain and at the same time provide privacy to sensitive data. Privacy technologies permit conducting private transactions about sensitive data over transparent networks, but their inherent
Bellés Muñoz, Marta   +3 more
openaire   +5 more sources

Privacy concerns and protection behavior during the Covid-19 pandemic [PDF]

open access: yesProblems and Perspectives in Management, 2022
This paper aims to analyze the protection behavior of employees while working remotely during the Covid-19 pandemic using online video chat software.
Ranjany Sundaram, Snehal Shetty
doaj   +1 more source

Formally verifying Kyber

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper we present the first formally verified implementations of Kyber and, to the best of our knowledge, the first such implementations of any post-quantum cryptosystem.
José Bacelar Almeida   +11 more
doaj   +1 more source

Home - About - Disclaimer - Privacy