Results 291 to 300 of about 703,183 (313)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), 2016
Cloud Computing has been one of the most fascinating and influential technologies in recent years and has literally revolutionised the way we access computing resources by providing a virtually unlimited amount of resources instantaneously. Despite this seemingly amazing breakthrough, there are still some clouds on the horizon, preventing the paradigm ...
Florian Kemmer +3 more
openaire +1 more source
Cloud Computing has been one of the most fascinating and influential technologies in recent years and has literally revolutionised the way we access computing resources by providing a virtually unlimited amount of resources instantaneously. Despite this seemingly amazing breakthrough, there are still some clouds on the horizon, preventing the paradigm ...
Florian Kemmer +3 more
openaire +1 more source
Privacy Petri Net and Privacy Leak Software
Journal of Computer Science and Technology, 2015Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the ...
Le-Jun Fan +4 more
openaire +1 more source
Proceedings of the 40th International Conference on Software Engineering, 2017
Privacy by design (PbD) is a policy measure that guides software developers to apply inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is important to understand developers' perceptions, interpretation and practices as to informational privacy (or data protection).
Irit Hadar +6 more
openaire +1 more source
Privacy by design (PbD) is a policy measure that guides software developers to apply inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is important to understand developers' perceptions, interpretation and practices as to informational privacy (or data protection).
Irit Hadar +6 more
openaire +1 more source
Privacy Enabled Software Architecture
2021Establishment of privacy legislation regulations like the General Data Protection Regulation (GDPR) makes privacy to become one of the very important quality requirements towards software systems. Software companies need to develop strict strategies to comply with such regulations. However, currently privacy is frequently studied together with security,
Emilia Stefanova, Aleksandar Dimov
openaire +1 more source
Privacy Oriented Software Development
2019Threats to applications security are continuously evolving thanks to factors such as progress made by the attackers, release of new technologies, use of increasingly complex systems. In this scenario, it is necessary to implement both design and programming practices that guarantee the security of the code on one hand, and the privacy of the data, on ...
Baldassarre M. T. +3 more
openaire +2 more sources
Quantitative analysis for privacy leak software with privacy Petri net
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics, 2012Nowadays, lots of private information are collected and spread without proper protection. privacy leak behavior has been widely discovered in many malwares and suspicious applications. We refer to such software as privacy leak software (PLS). In this paper we present an abstract model called Privacy Petri Net (PPN) for privacy leaks analysis.
Lejun Fan +3 more
openaire +1 more source
Privacy-Invasive Software and Preventive Mechanisms
2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006Computers are increasingly more integrated into peoples? daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometimes loosely labelled as spyware. The border between legitimate software and PIS is vague and context dependent, at best specified through End-User License Agreements (EULA). This
Martin Boldt, Bengt Carlsson
openaire +1 more source
Software and privacy: revising Orwell
IEEE Software, 1993It is argued that employers frequently use computers as a surveillance device and a means to monitor almost every aspect of employee performance. Employers justify such conduct by asserting that this helps ensure job safety and workplace security, reduce costs and limit liability; and increase productivity, efficiency, and product quality.
openaire +1 more source

