Results 51 to 60 of about 3,580,379 (342)

Secure and Efficient Privacy-Preserving Authentication Scheme for 5G Software Defined Vehicular Networks

open access: yesIEEE Transactions on Vehicular Technology, 2020
Vehicular networks provide various applications for vehicles to improve road safety and traffic efficiency as well as infotainment. Security and privacy are of great importance for the deployment of vehicular networks.
Jiaqi Huang, Y. Qian, R. Hu
semanticscholar   +1 more source

Computer-Aided Identification and Validation of Privacy Requirements

open access: yesInformation, 2016
Privacy is a software quality that is closely related to security. The main difference is that security properties aim at the protection of assets that are crucial for the considered system, and privacy aims at the protection of personal data that are ...
Rene Meis, Maritta Heisel
doaj   +1 more source

Looking Back to Move Forward: A Bibliometric Analysis of Consumer Privacy Research

open access: yesJournal of Theoretical and Applied Electronic Commerce Research, 2021
Information privacy has attracted considerable attention in the information system research field. However, little effort has been made to review its latest developments from a marketing perspective.
Sheng Shu, Yi Liu
doaj   +1 more source

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II

open access: yesInternational Journal of Telerehabilitation, 2011
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over the Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy.  In this
Valerie J.M. Watzlaf   +3 more
doaj   +1 more source

A qualitative study of stakeholders' perspectives on the social network service environment [PDF]

open access: yes, 2014
Over two billion people are using the Internet at present, assisted by the mediating activities of software agents which deal with the diversity and complexity of information.
Arazy O.   +48 more
core   +1 more source

Computer-Aided Identification and Validation of Intervenability Requirements

open access: yesInformation, 2017
Privacy as a software quality is becoming more important these days and should not be underestimated during the development of software that processes personal data.
Rene Meis, Maritta Heisel
doaj   +1 more source

Advanced Cloud Privacy Threat Modeling

open access: yes, 2016
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing ...
Gholami, Ali, Laure, Erwin
core   +1 more source

Domino: exploring mobile collaborative software adaptation [PDF]

open access: yes, 2006
Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users.
A. Pfitzmann   +7 more
core   +2 more sources

Privacy in Social Software

open access: yes, 2011
While using social software and interacting with others on the Internet, users share a lot of information about themselves. An important issue for these users is maintaining control over their own personal data and being aware to whom which data is disclosed. In this chapter, we present specific requirements and realised solutions to these problems for
Filipe Beato   +4 more
openaire   +3 more sources

Prochlo: Strong Privacy for Analytics in the Crowd

open access: yes, 2017
The large-scale monitoring of computer users' software activities has become commonplace, e.g., for application telemetry, error reporting, or demographic profiling. This paper describes a principled systems architecture---Encode, Shuffle, Analyze (ESA)--
Abadi M.   +22 more
core   +1 more source

Home - About - Disclaimer - Privacy