Results 321 to 330 of about 667,722 (335)
Quantitative analysis for privacy leak software with privacy Petri net [PDF]
Nowadays, lots of private information are collected and spread without proper protection. privacy leak behavior has been widely discovered in many malwares and suspicious applications. We refer to such software as privacy leak software (PLS). In this paper we present an abstract model called Privacy Petri Net (PPN) for privacy leaks analysis.
Lejun Fan+3 more
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Privacy Enabled Software Architecture
2021Establishment of privacy legislation regulations like the General Data Protection Regulation (GDPR) makes privacy to become one of the very important quality requirements towards software systems. Software companies need to develop strict strategies to comply with such regulations. However, currently privacy is frequently studied together with security,
Aleksandar Dimov, Emilia Stefanova
openaire +2 more sources
Privacy by Evidence: A Methodology to develop privacy-friendly software applications
Information Sciences, 2020Abstract In an increasingly connected world, a diversity of data is collected from the environment and its inhabitants. Because of the richness of the information, privacy becomes an important requirement. Although there are principles and rules, there is still a lack of methodologies to guide the integration of privacy guidelines into the ...
Hyggo Almeida+2 more
openaire +2 more sources
Are Designers Ready for Privacy by Design? Examining Perceptions of Privacy Among Information Systems Designers [PDF]
How do information systems designers handle privacy when designing systems? How do they perceive and interpret privacy? Privacy by Design (PbD) is the idea that designers should apply technological measures that aim to address privacy concerns, applied to the very same technology that might create the privacy risk.
Arod Balissa+6 more
openaire +3 more sources
Privacy Oriented Software Development
2019Threats to applications security are continuously evolving thanks to factors such as progress made by the attackers, release of new technologies, use of increasingly complex systems. In this scenario, it is necessary to implement both design and programming practices that guarantee the security of the code on one hand, and the privacy of the data, on ...
Baldassarre M. T.+3 more
openaire +3 more sources
Software and privacy: revising Orwell
IEEE Software, 1993It is argued that employers frequently use computers as a surveillance device and a means to monitor almost every aspect of employee performance. Employers justify such conduct by asserting that this helps ensure job safety and workplace security, reduce costs and limit liability; and increase productivity, efficiency, and product quality.
openaire +2 more sources
Commercial software, adware, and consumer privacy [PDF]
Abstract I study the choice between selling new software commercially and bundling it with ads and distributing it for free as adware. Adware allows advertisers to send targeted information to consumers which improves their purchasing decisions, but also entails a loss of privacy.
openaire +1 more source
Privacy-Invasive Software and Preventive Mechanisms
2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006Computers are increasingly more integrated into peoples? daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometimes loosely labelled as spyware. The border between legitimate software and PIS is vague and context dependent, at best specified through End-User License Agreements (EULA). This
Martin Boldt, Bengt Carlsson
openaire +2 more sources
Modifications to GCC for increased software privacy
International Journal of Information and Computer Security, 2015The paper describes methodologies added to the Gnu compiler collection GCC in an effort to create an obfuscating compiler. An obfuscating compiler creates programs which, when run, execute with the same results as un-obfuscated code, but which are more difficult to reverse engineer from the binary artefact.
openaire +2 more sources
Software Security, Privacy, and Dependability: Metrics and Measurement
IEEE Software, 2016Measurement of software security is an ongoing research field. Privacy is also becoming an imperative target as social networking and ubiquitous computing evolve and users exchange high volumes of personal information. However, security and privacy alone don't guarantee proper data protection; software must also be dependable.
Charalampos Manifavas+2 more
openaire +2 more sources