Results 291 to 300 of about 703,183 (313)

Privacy-by-Design Approach to Generate Two Virtual Clinical Trials for Multiple Sclerosis and Release Them as Open Datasets: Evaluation Study.

open access: yesJ Med Internet Res
Demuth S   +11 more
europepmc   +1 more source

Software Defined Privacy

2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), 2016
Cloud Computing has been one of the most fascinating and influential technologies in recent years and has literally revolutionised the way we access computing resources by providing a virtually unlimited amount of resources instantaneously. Despite this seemingly amazing breakthrough, there are still some clouds on the horizon, preventing the paradigm ...
Florian Kemmer   +3 more
openaire   +1 more source

Privacy Petri Net and Privacy Leak Software

Journal of Computer Science and Technology, 2015
Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the ...
Le-Jun Fan   +4 more
openaire   +1 more source

Privacy by designers

Proceedings of the 40th International Conference on Software Engineering, 2017
Privacy by design (PbD) is a policy measure that guides software developers to apply inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is important to understand developers' perceptions, interpretation and practices as to informational privacy (or data protection).
Irit Hadar   +6 more
openaire   +1 more source

Privacy Enabled Software Architecture

2021
Establishment of privacy legislation regulations like the General Data Protection Regulation (GDPR) makes privacy to become one of the very important quality requirements towards software systems. Software companies need to develop strict strategies to comply with such regulations. However, currently privacy is frequently studied together with security,
Emilia Stefanova, Aleksandar Dimov
openaire   +1 more source

Privacy Oriented Software Development

2019
Threats to applications security are continuously evolving thanks to factors such as progress made by the attackers, release of new technologies, use of increasingly complex systems. In this scenario, it is necessary to implement both design and programming practices that guarantee the security of the code on one hand, and the privacy of the data, on ...
Baldassarre M. T.   +3 more
openaire   +2 more sources

Quantitative analysis for privacy leak software with privacy Petri net

Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics, 2012
Nowadays, lots of private information are collected and spread without proper protection. privacy leak behavior has been widely discovered in many malwares and suspicious applications. We refer to such software as privacy leak software (PLS). In this paper we present an abstract model called Privacy Petri Net (PPN) for privacy leaks analysis.
Lejun Fan   +3 more
openaire   +1 more source

Privacy-Invasive Software and Preventive Mechanisms

2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006
Computers are increasingly more integrated into peoples? daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometimes loosely labelled as spyware. The border between legitimate software and PIS is vague and context dependent, at best specified through End-User License Agreements (EULA). This
Martin Boldt, Bengt Carlsson
openaire   +1 more source

Software and privacy: revising Orwell

IEEE Software, 1993
It is argued that employers frequently use computers as a surveillance device and a means to monitor almost every aspect of employee performance. Employers justify such conduct by asserting that this helps ensure job safety and workplace security, reduce costs and limit liability; and increase productivity, efficiency, and product quality.
openaire   +1 more source

Home - About - Disclaimer - Privacy