Results 41 to 50 of about 667,722 (335)

My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud [PDF]

open access: yes, 2011
Based on the assumption that cloud providers can be trusted (to a certain extent) we define a trust, security and privacy preserving infrastructure that relies on trusted cloud providers to operate properly.
Alhadeff, Joseph   +4 more
core   +3 more sources

Software-Defined Location Privacy Protection for Vehicular Networks [PDF]

open access: yes, 2021
While the adoption of connected vehicles is growing, security and privacy concerns are still the key barriers raised by society. These concerns mandate automakers and standardization groups to propose convenient solutions for privacy preservation. One of the main proposed solutions is the use of Pseudonym-Changing Strategies (PCSs).
Boualouache, Abdelwahab   +3 more
openaire   +4 more sources

Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]

open access: yes, 2019
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel   +3 more
core   +2 more sources

Privacy-Enabled Recommendations for Software Vulnerabilities [PDF]

open access: yes2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019
New software vulnerabilities are published daily. Prioritizing vulnerabilities according to their relevance to the collection of software an organization uses is a costly and slow process. While recommender systems were earlier proposed to address this issue, they ignore the security of the vulnerability prioritization data.
Karlsson, Linus, Paladi, Nicolae
openaire   +3 more sources

Security and privacy qualities of medical devices: an analysis of FDA postmarket surveillance. [PDF]

open access: yesPLoS ONE, 2012
Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients' stored medical information.
Daniel B Kramer   +6 more
doaj   +1 more source

Speranza: Usable, Privacy-friendly Software Signing

open access: yesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
15 pages, 5 ...
Kelsey Merrill   +3 more
openaire   +3 more sources

On a Formal and User-friendly Linguistic Approach to Access Control of Electronic Health Data [PDF]

open access: yes, 2013
The importance of the exchange of Electronic Health Records (EHRs) between hospitals has been recognized by governments and institutions. Due to the sensitivity of data exchanged, only mature standards and implementations can be chosen to operate.
Margheri, Andrea   +3 more
core   +1 more source

Children's data and privacy online: Growing up in a digital age [PDF]

open access: yesPolitika nacionalne bezbednosti, 2023
Adolescents in the age of technology face a variety of security issues, but one of the most significant ones, that needs to be addressed by legislators, is privacy and data protection.
Domazet Siniša S.   +1 more
doaj   +1 more source

Towards Privacy-aware Software Reuse

open access: yesProceedings of the 7th International Conference on Model-Driven Engineering and Software Development, 2019
As software becomes more complex, reusing and integrating artifacts from existing projects that may be taken from open or organization-proprietary repositories is becoming an increasingly important practice. This practice requires an in-depth understanding of the projects to be reused and particularly their common and variable features and their non ...
Reinhartz-Berger, Iris   +2 more
openaire   +3 more sources

A Novel Group Recommendation Mechanism From the Perspective of Preference Distribution

open access: yesIEEE Access, 2018
As people have become more and more connected, there are certain scenarios where items need to be recommended to groups of users rather than individual user, which motivate studies on group recommender systems (GRSs).
Zhiwei Guo   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy