Optimization of the Mainzelliste Software for Fast Privacy-preserving Record Linkage
Florens Rohde +4 more
openalex +3 more sources
Measuring privacy leakage in term of Shannon entropy
Differential privacy is a privacy scheme in which a database is modified such that each users personal data are protected without affecting significantly the characteristics of the whole data.
Ricky Aditya, Boris Skoric
doaj +1 more source
On Making Emerging Trusted Execution Environments Accessible to Developers
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions.
Asokan, N. +2 more
core +1 more source
Privacy self-regulation and the changing role of the state : from public law to social and technical mechanisms of governance [PDF]
This paper provides a structured overview of different self-governance mechanisms for privacy and data protection in the corporate world, with a special focus on Internet privacy.
Bendrath, Ralf
core
Generating Privacy Stories From Software Documentation
Research shows that analysts and developers consider privacy as a security concept or as an afterthought, which may lead to non-compliance and violation of users' privacy. Most current approaches, however, focus on extracting legal requirements from the regulations and evaluating the compliance of software and processes with them.
Baldwin, Wilder +5 more
openaire +2 more sources
Altered integrated and segregated states in cocaine use disorder
IntroductionCocaine use disorder (CUD) is a chronic brain condition that severely impairs cognitive function and behavioral control. The neural mechanisms underlying CUD, particularly its impact on brain integration–segregation dynamics, remain unclear ...
Yi Zheng +23 more
doaj +1 more source
Privacy as Product Safety [PDF]
Online social media confound many of our familiar expectaitons about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves.
Grimmelmann, James
core +1 more source
Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign
Current day software development relies heavily on the use of service architectures and on agile iterative development methods to design, implement, and deploy systems. These practices result in systems made up of multiple services that introduce new data flows and evolving designs that escape the control of a single designer.
Kostova, Blagovesta +2 more
openaire +2 more sources
A Comprehensive Survey of Security and Privacy in UAV Systems
The proliferation of unmanned aerial vehicles (UAVs) across diverse applications, from photography to critical infrastructure inspection, has raised significant security and privacy challenges.
Bryce Cordill +2 more
doaj +1 more source
Privacy self-regulation and the changing role of the state: from public law to social and technical mechanisms of governance [PDF]
This paper provides a structured overview of different self-governance mechanisms for privacy and data protection in the corporate world, with a special focus on Internet privacy.
Bendrath, Ralf
core

