A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Consumer-centric protection for online social networks
2014
Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)
However, these protections are, to a great extent, not consumer-centric: this is the main focus of this study. In this paper, we define the notion of Consumer-Centric Protection (CCP) for OSNs. ...
A large portion of internet users make use of OSN services to share and celebrate their personal lives with friends and family. ...
Therefore, to provide a consumer-oriented protection for users on OSNs, we have proposed a framework in this paper. ...
doi:10.1109/iri.2014.7051872
dblp:conf/iri/AkramKL14
fatcat:cus2e3ufefbkviczv5bosdw7xi
VCC-SSF: Service-Oriented Security Framework for Vehicular Cloud Computing
2015
Sustainability
Furthermore, it provides authentication, encryption, access control, OPEN ACCESS Sustainability 2015, 7 2029 confidentiality, integrity, and privacy protection for user personal information and information ...
The proposed framework considers security for convenient and efficient services of VCC and includes new user-oriented payment management and active accident management services. ...
Promotion Agency)-(Various content services and security framework that is optimized for vehicle technology works in the connected-car platform). ...
doi:10.3390/su7022028
fatcat:qgo232rilnaglpcijhaggv4izy
Data protection issues pertaining to social networking under EU law
2010
Transforming Government: People, Process and Policy
The European data protection legislation could be used as a means for protecting the users against the unlawful processing of their personal information, although a number of problems arise regarding its ...
services and how social networking fits in the existing European legal framework on data protection. ...
The European Data Protection legislation could be used as a means for protecting the users against the unlawful processing of their personal information, although a number of problems arising regarding ...
doi:10.1108/17506161011047406
fatcat:equc25om7jfa7jd3w4taxnnejy
User-Side Personalization Considering Privacy Preserving in Cloud Systems
2013
2013 27th International Conference on Advanced Information Networking and Applications Workshops
the hosts to access their personal data for personalization purposes. ...
To solve this controversy, in this paper we introduce a new personalization framework and architecture conveys privacy issues. ...
The main contribution of this paper is an innovative cloud architecture and framework that offers personalized services while protecting user information via user-side personalization and data anonymization ...
doi:10.1109/waina.2013.193
dblp:conf/aina/SharifiB13
fatcat:ldtkjy7is5bfzl2oazgfpndosm
PERSONA - A Personalized Data Protection Framework
[chapter]
2013
IFIP Advances in Information and Communication Technology
We discuss the challenges of designing a personalized data protection framework using personalized medicine as an illustrative scenario. ...
In this paper we present the foundation of a novel approach to personalized data protection in which users play a central role in the authoring and enforcement of the policies governing the access and ...
In the next section, we discuss the challenges to be addressed for the design of a personalized data protection framework using a scenario on personalized medicine. ...
doi:10.1007/978-3-642-38323-6_22
fatcat:4efeqrtbjje2fpxbpfnrohg7ei
SENTINEL - Approachable, tailor-made cybersecurity and data protection for small enterprises
2022
Zenodo
and privacy technologies with fresh, ambitious ones, such as a novel Identity Management System (IdMS) for human-centric data portability, and an end-to-end PDP compliance self-assessment framework. ...
Over 25 million Small and Medium Enterprises (SMEs) in Europe face multiple challenges related to personal data protection (PDP), ranging from awareness of EU's General Data Protection Regulation (GDPR ...
ACKNOWLEDGEMENTS The authors acknowledge the European Commission for the support and funding under the scope of Horizon2020 SENTINEL Project (Grant Agreement Number 101021659) and the partners of the SENTINEL ...
doi:10.5281/zenodo.7544880
fatcat:7sk6pd3nmjhqndwfxo2xtuvsvm
A Systematic Literature Review on Privacy by Design in the Healthcare Sector
2020
Electronics
The result, targeted at the healthcare sector, is expected to produce a high degree of fortification against data breaches in the personal information domain. ...
These data, or the derived information out of it, are often too personal to fall into unwanted hands, and thus users are almost always wary of the privacy of such private data that are being continuously ...
Between these, five frameworks have been selected because they are proposed for healthcare information systems and other environments for protecting personal information. ...
doi:10.3390/electronics9030452
fatcat:u43wam6msbfo5gnnl3vqjn32k4
The Internet Design Framework for Improvement of Users' Positive Emotions
2022
KSII Transactions on Internet and Information Systems
This study proposes an internet design framework for users to improve their positive emotions when they are in a negative mood. ...
Finally, an internet design framework is proposed to improve users' positive emotions when they are in a negative mood, which includes the Detachment-empathy framework, External-protection framework, Abilitystrengthen ...
A trapped person who is swept into the current, floating on the water by means of a basin or a floating board, and protecting himself, is a manifestation of the Ability-strengthen framework. ...
doi:10.3837/tiis.2022.08.014
fatcat:jvy3eulyyzd25en3foehmyeg6q
Building future generation service-oriented information broker networks
2013
International Journal of Advanced Computer Science and Applications
for user-friendly serviceoriented broker platforms. ...
These networks form a rising class of service-oriented broker platforms. ...
could contribute a basis for a privacy-oriented standardization intiative for cross-platform information brokerage of personal data. ...
doi:10.14569/ijacsa.2013.041124
fatcat:udxruffhknb5bnwe7fb77dzzy4
Internet of Everything (Ioe): Analysing the Individual Concerns Over Privacy Enhancing Technologies (Pets)
2016
International Journal of Advanced Computer Science and Applications
Modern organisations use consent forms to gather individual's sensitive personal information for a specific purpose. ...
The individual's privacy has gained a considerable momentum in both industry and academia since privacy-enhancing technologies (PETs) constitute a technical means to protect information. ...
For example, Rotenberg, [35] has argued that most practitioners tend to use Privacy Enhancing Technologies (PET) that create a technological framework that facilitates the disclosure of personal information ...
doi:10.14569/ijacsa.2016.070303
fatcat:avugxnij4ffzhaeq3ctu3bve6q
A Framework of Evaluation Location Privacy in Mobile Network
2013
Procedia Computer Science
The goal of this paper is to build a common model to describe the location privacy protecting mechanism and show how to evaluate the location privacy in our framework. ...
In this paper, we present a framework to model location privacy preserving mechanism, and abstract the properties characterizing the effectiveness of these approaches. ...
Acknowledgment This research is supported by the National Natural Science Foundation of China (61070186) and the Strategic Priority Research Program of the Chinese Academy of Sciences(XDA06030200) ...
doi:10.1016/j.procs.2013.05.112
fatcat:sk6nq5xourdbphuc3jog35hofu
Personal Data Protection: Rules among exceptions and WhatsApp
2021
International Journal for Research in Applied Science and Engineering Technology
The Personal Data Protection Bill, 2019 seeks to bring in a data protection regime to curb and prevent misuse of personal data. ...
It is important to understand and regulate metadata because it can be used for profiling users. The anonymous profile can contain data as valuable as personal information. ...
THE IT ACT AND SPD RULES FRAMEWORK The framework for protection of personal data is based on the Information Technology Act, 2000. ...
doi:10.22214/ijraset.2021.38618
fatcat:sqynvacprvh65avbszvlstwb4u
Combination of Fingerprints to Secure Privacy
2015
International Journal of Science and Research (IJSR)
In this paper the fingerprint protection security by combining two different fingerprints into another identity is discussed. ...
Here combined template is used to strengthen the security by extracting minutiae positions and reference points from one fingerprint and orientation and reference points from other fingerprint, we generate ...
Local ridge orientation is usually specified for a block rather than at every pixel; an image is divided into a set of w x w non-overlapping blocks and a single local ridge orientation is defined for each ...
doi:10.21275/v4i12.nov152381
fatcat:tuoiw3yuczhqtnz7ta4vl33lne
User Privacy Framework for Web-of-Objects based Smart Home Services
2015
International Journal of Smart Home
This paper presents user privacy framework for web-of-objects based smart home services to control the release of personally identifiable information (PII) in smart home environment. ...
We propose Smart Home Web of Object User Privacy (SWOPR) architecture to protect and control the release of user PIIs according to the user consent. ...
The work in [24] proposes a privacy framework for patients in Healthcare providers called SPOC that help patients in protecting and monitoring personal health information (PHI) in pervasive environment ...
doi:10.14257/ijsh.2015.9.5.07
fatcat:fwciappzizh63flbohpnumoboi
Software Piracy Protection
2019
International Journal of Trend in Scientific Research and Development
Key to the analysis is joining the presence of a positive network security with the fact that piracy increases the total number of program users. ...
The model developed here suggests that in some circumstances, even with significant piracy, not protecting can be the best policy, both raising firm profits and lowering selling prices. ...
Privacy advocates are interested in similar mechanisms for protecting personal information given to others in digital format. ...
doi:10.31142/ijtsrd21705
fatcat:dbm7muqrrfbizndodztrlod6na
« Previous
Showing results 1 — 15 out of 170,976 results