Results 11 to 20 of about 2,194 (257)
Privacy and Data Protection in Software Services
This paper deals with the use of software in insurance production and distribution considering the privacy issues that can arise. With regards to those uses, we will first consider the use of software in distribution that is needed to better perform the compliance with the regulations in insurance distribution (submission of information documents ...
Camilla Tabarrini
openalex +4 more sources
Assessing software privacy using the privacy flow-graph [PDF]
We increasingly rely on digital services and the conveniences they provide. Processing of personal data is integral to such services and thus privacy and data protection are a growing concern, and governments have responded with regulations such as the EU's GDPR.
Feiyang Tang, Bjarte M. Østvold
openalex +3 more sources
Privacy-Enabled Recommendations for Software Vulnerabilities [PDF]
New software vulnerabilities are published daily. Prioritizing vulnerabilities according to their relevance to the collection of software an organization uses is a costly and slow process. While recommender systems were earlier proposed to address this issue, they ignore the security of the vulnerability prioritization data.
Linus Karlsson, Nicolae Paladi
openalex +3 more sources
Developer factor in software privacy
Computer programming operates and controls our personal devices, cars, and infrastructures. These programs are written by software developers who use tools, software development platforms, and online resources to build systems used by billions of people.
Mohammad Tahaei
openalex +4 more sources
New Privacy Practices for Blockchain Software [PDF]
In this article, we present the software tools we have implemented to bring complex privacy technologies closer to developers and to facilitate the implementation of privacyenabled blockchain applications.
Bellés Muñoz, Marta +3 more
openaire +4 more sources
Software-Defined Location Privacy Protection for Vehicular Networks [PDF]
While the adoption of connected vehicles is growing, security and privacy concerns are still the key barriers raised by society. These concerns mandate automakers and standardization groups to propose convenient solutions for privacy preservation. One of the main proposed solutions is the use of Pseudonym-Changing Strategies (PCSs).
Abdelwahab Boualouache +2 more
openalex +4 more sources
Privacy violations in online social networks (OSNs) often arise as a result of users sharing information with unintended audiences. One reason for this is that, although OSN capabilities for creating and managing social groups can make it easier to be selective about recipients of a given post, they do not provide enough guidance to the users to make ...
Calikli, Gul +8 more
openaire +3 more sources
The privacy box: A software proposal
The contradiction of social networks is that revealing of personal, private information can have harmful consequences, yet users continue to disclose such information at an alarming rate. Ironically, the advent of social network sites opens the possibility of a relatively safe place to disclose private information. This article proposes a “privacy box”
Woodrow Hartzog
openalex +2 more sources
Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign [PDF]
Current day software development relies heavily on the use of service architectures and on agile iterative development methods to design, implement, and deploy systems. These practices result in systems made up of multiple services that introduce new data flows and evolving designs that escape the control of a single designer.
Blagovesta Kostova +2 more
openalex +3 more sources

