Results 311 to 320 of about 3,593,621 (344)
Some of the next articles are maybe not open access.
Translating Privacy Design Principles Into Human-Centered Software Lifecycle: A Literature Review
International journal of human computer interactions, 2023Companies and organizations involved in software development are stimulated and often obliged to consider procedures and technical solutions to guarantee data privacy and protection from the early phases of the software lifecycle. In addition, by default,
Marco Saltarella+3 more
semanticscholar +1 more source
Privacy by Design and Software Engineering: a Systematic Literature Review
Brazilian Symposium on Software Quality, 2022Service providers increasingly collect, process, store, and share data from their users to understand their preferences to make better decisions and make accurate estimates for the delivery of advertisements, products, and services.
Vinícius Camargo Andrade+4 more
semanticscholar +1 more source
DoS Attacks, Triad and Privacy: Software Exposures in Microsoft, Apple and Google
2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), 2020Internet age thrives on connectivity features and accessibility options, while denial of services attacks are detrimental to accessibility. In this context our research is making use of software exposures datasets from National Institute of Standards and
Shahid Anium
semanticscholar +1 more source
Privacy Oriented Software Development
Quality of Information and Communications Technology, 2019Threats to applications security are continuously evolving thanks to factors such as progress made by the attackers, release of new technologies, use of increasingly complex systems. In this scenario, it is necessary to implement both design and programming practices that guarantee the security of the code on one hand, and the privacy of the data, on ...
M. T. Baldassarre+3 more
semanticscholar +4 more sources
SDN‐chain: Privacy‐preserving protocol for software defined networks using blockchain
Security and Privacy, 2021Software‐defined networking (SDN) is a programmable architecture for networking domain in which the security is provided by devising the network policies with the help of the network administrator.
R. Shashidhara+5 more
semanticscholar +1 more source
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), 2016
Cloud Computing has been one of the most fascinating and influential technologies in recent years and has literally revolutionised the way we access computing resources by providing a virtually unlimited amount of resources instantaneously. Despite this seemingly amazing breakthrough, there are still some clouds on the horizon, preventing the paradigm ...
Nathan Clarke+3 more
openaire +2 more sources
Cloud Computing has been one of the most fascinating and influential technologies in recent years and has literally revolutionised the way we access computing resources by providing a virtually unlimited amount of resources instantaneously. Despite this seemingly amazing breakthrough, there are still some clouds on the horizon, preventing the paradigm ...
Nathan Clarke+3 more
openaire +2 more sources
International Conference of Distributed Computing and Networking, 2020
The Software Defined Internet of Things-Fog (SDIoT-Fog) has provided a new connectivity paradigm for effective service provisioning. SDIoT-Fog uses network resource virtualization to provide services to heterogeneous IoT devices.
Prabhat Kumar+2 more
semanticscholar +1 more source
The Software Defined Internet of Things-Fog (SDIoT-Fog) has provided a new connectivity paradigm for effective service provisioning. SDIoT-Fog uses network resource virtualization to provide services to heterogeneous IoT devices.
Prabhat Kumar+2 more
semanticscholar +1 more source
Privacy Petri Net and Privacy Leak Software
Journal of Computer Science and Technology, 2015Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the ...
Lejun Fan+4 more
openaire +2 more sources
Quantitative analysis for privacy leak software with privacy Petri net [PDF]
Nowadays, lots of private information are collected and spread without proper protection. privacy leak behavior has been widely discovered in many malwares and suspicious applications. We refer to such software as privacy leak software (PLS). In this paper we present an abstract model called Privacy Petri Net (PPN) for privacy leaks analysis.
Lejun Fan+3 more
openaire +1 more source
Privacy Enabled Software Architecture
2021Establishment of privacy legislation regulations like the General Data Protection Regulation (GDPR) makes privacy to become one of the very important quality requirements towards software systems. Software companies need to develop strict strategies to comply with such regulations. However, currently privacy is frequently studied together with security,
Aleksandar Dimov, Emilia Stefanova
openaire +2 more sources