Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








20,647 Hits in 4.8 sec

Automated identification of sensitive data from implicit user specification

Ziqi Yang, Zhenkai Liang
2018 Cybersecurity  
In this paper, we propose S3, an automated approach to identify sensitive data based on users' implicit specifications.  ...  Our approach is able to learn users' preferences from readable concepts initially provided by users, and automatically identify related sensitive data.  ...  Availability of data and material The dataset supporting the conclusions of this article is available in the Dropbox repository https://www.dropbox.com/s/00hjztyw2zw35i3/s3.zip?dl=0.  ... 
doi:10.1186/s42400-018-0011-x fatcat:46zzkshfprbufpeoj77ugllpga

DMS AND RFID AS AN INNOVATION IN THE ARCHIVING AND DOCUMENT MANAGEMENT IN THE COMPANY

Małgorzata Oleś
2017 Research on Enterprise in Modern Economy Theory and Practice  
Archiving and document management are issues faced by all companies regardless of their size and specific action.  ...  The aim of the article is to present created in the framework of research and development project management support system and the archiving of documents the organization.  ...  Automate the tracking of the documents submitted, the appropriate organizational conditions may constitute a specific doubling (reserve) records resulting from human activities.  ... 
doi:10.19253/reme.2017.03.002 doaj:488fa2d3f9aa4e5aabeb1b1ea36438ad fatcat:kyl3g2gytzcznk6z75awe5sygy

Sensitive Information Tracking in Commodity IoT [article]

Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac
2018 arXiv   pre-print
to identify sensitive data flows.  ...  SainT operates in three phases; (a) translation of platform-specific IoT source code into an intermediate representation (IR), (b) identifying sensitive sources and sinks, and (c) performing static analysis  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory  ... 
arXiv:1802.08307v1 fatcat:uc55f2yqr5bpxjmkwkio64xahq

PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT

Lu Yang, Xingshu Chen, Yonggang Luo, Xiao Lan, Li Chen, Ahmed Meddahi
2021 Security and Communication Networks  
The extensive data collection performed by the Internet of Things (IoT) devices can put users at risk of data leakage.  ...  The implicit purpose extraction of the adapted model significantly improves the F1-score by 11%.  ...  Acknowledgments is work was supported by the National Natural Science Foundation of China (nos. U19A2081 and 61802270).  ... 
doi:10.1155/2021/5552501 fatcat:45zmgsjjkrh3palfjqbxjf25cu

Implicit dimension identification in user-generated text with LSTM networks

Victor Makarenkov, Ido Guy, Niva Hazon, Tamar Meisels, Bracha Shapira, Lior Rokach
2019 Information Processing & Management  
In the process of online storytelling, individual users create and consume highly diverse content that contains a great deal of implicit beliefs and not plainly expressed narrative.  ...  perspective detection in news articles 2) identification of informational vs. conversational questions in community question answering (CQA) archives and.  ...  DIMENSION IDENTIFICATION IN USER-GENERATED TEXT 5 benefit from automated classification of these implicit dimensions.  ... 
doi:10.1016/j.ipm.2019.02.007 fatcat:2ux6ybrvjngztm72addfqumy3y

Improving Recommender Systems Through the Automation of Design Decisions

Lukas Wegmeth
2023 Proceedings of the 17th ACM Conference on Recommender Systems  
Furthermore, we focus specifically on the development of novel automation approaches for data processing and training. We note that the realization of AutoRecSys is going to be a community effort.  ...  The goal of AutoRecSys is not to replace recommender systems developers but to improve performance through the automation of design decisions.  ...  On the other hand, if a data set contains only the implicit interactions of users with items, this data set is said to contain implicit feedback.  ... 
doi:10.1145/3604915.3608877 fatcat:aoqivogol5aopdp3uunc5vbmhy

Exploring Privacy Implications in OAuth Deployments [article]

Srivathsan G. Morkonda, Paul C. van Oorschot, Sonia Chiasson
2021 arXiv   pre-print
We categorize user data made available by four identity providers (Google, Facebook, Apple and LinkedIn) and evaluate popular services accessing user data from the SSO platforms of these providers.  ...  These services can both identify users and access a subset of the user's data stored with the provider.  ...  Perceived sensitivity of specific user data could also vary across countries, and consequently lead to different privacy implications for users. B.  ... 
arXiv:2103.02579v1 fatcat:p6bn5smgrze4zhxb2q24lzd5ny

Metamorphic Security Testing for Web Systems

Phu X. Mai, Fabrizio Pastore, Arda Goknil, Lionel Briand
2020 2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST)  
Security testing verifies that the data and the resources of software systems are protected from attackers.  ...  Unfortunately, it suffers from the oracle problem, which refers to the challenge, given an input for a system, of distinguishing correct from incorrect behavior.  ...  We measured specificity and sensitivity [111] .  ... 
doi:10.1109/icst46399.2020.00028 dblp:conf/icst/MaiPGB20 fatcat:frwc3ss6v5er5ni3fdf252pxu4

Investigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detection

Rui Hou, Zhigang Jin, Baoliang Wang
2016 EURASIP Journal on Wireless Communications and Networking  
Monitoring sensitive data with TaintChaser provides informed use of third-party applications for phone users and valuable input for smart-phone security service firms seeking to identify misbehaving applications  ...  To better detect user's implicit taint and privacy leakage in the Android platform, this paper analyzes implicit taint detection and then proposes an automated detection system based on dynamic taint tracking  ...  I thank Jim Yao and Tom Wang for their feedback during the writing of this paper.  ... 
doi:10.1186/s13638-016-0711-4 fatcat:fgcfyowo55g6pia5umx3vmo5mq

WND-Identifier: Automated and Efficient Identification of Wireless Network Devices

Fangzhou Zhu, Liang Liu, Simin Hu, Ting Lv, Renjun Ye, Marimuthu Karuppiah
2021 Security and Communication Networks  
) efficiently without user interaction.  ...  To assess and guarantee the security of wireless networks and user devices, discovering and identifying wireless devices become a foremost task.  ...  To overcome the above problems, ARE [35] establishes automated acquisitional rules to capture specific identifications including type, vendor, and model from the response data of IoT devices.  ... 
doi:10.1155/2021/9069123 fatcat:3zlaxv2y65ftrlphoszfnoxfzi

Normative Challenges of Identification in the Internet of Things: Privacy, Profiling, Discrimination, and the GDPR

Sandra Wachter
2017 Social Science Research Network  
The IoT is defined by connections and linked services, tailored to the specific requirements of users.  ...  The paper concludes that in order to minimise the privacy impact of the conflicts between data protection principles and identification in the IoT, GDPR standards urgently require further specification  ...  Funding This article is a deliverable of the Privacy-Enhancing and Identification-Enabling Solutions for IoT (PEIESI) project, part of the PETRAS Internet of Things research hub.  ... 
doi:10.2139/ssrn.3083554 fatcat:4iunn3i52nhhpdebakrhxd73qy

Metamorphic Security Testing for Web Systems [article]

Phu X. Mai, Fabrizio Pastore, Arda Goknil, Lionel Briand
2019 arXiv   pre-print
Security testing verifies that the data and the resources of software systems are protected from attackers.  ...  Our approach targets 39% of the OWASP security testing activities not automated by state-of-the-art techniques.  ...  We measured specificity and sensitivity [111] .  ... 
arXiv:1912.05278v1 fatcat:ez2yqzch2jhvvlxuoa4pgohfju

Exploring gender biases in ML and AI academic research through systematic literature review

Sunny Shrestha, Sanchari Das
2022 Frontiers in Artificial Intelligence  
Through a detailed analysis of N = 120 papers, we map the current research landscape on gender specific biases present in ML and AI assisted automated systems.  ...  We further point out the aspects of ML/AI gender biases research that are less explored and require more attention. Mainly we focus on the lack of user studies and inclusivity in this field of study.  ...  Acknowledgments We would like to acknowledge the Inclusive Security and Privacy-focused Innovative Research in Information Technology (InSPIRIT) lab at the University of Denver.  ... 
doi:10.3389/frai.2022.976838 fatcat:blhqy5v42new7ogzk7yyj5ikly

Review: Privacy-preservation in the context of Natural Language Processing

Darshini Mahendran, Changqing Luo, Bridget T. McInnes
2021 IEEE Access  
A considerable portion of user-contributed data is in natural language, and in the past few years, many researchers have proposed NLP-based methods to address these data privacy challenges.  ...  Data privacy is one of the highly discussed issues in recent years as we encounter data breaches and privacy scandals often.  ...  The sensitivity of the data can be categorized as 1) implicit information and 2) explicit information.  ... 
doi:10.1109/access.2021.3124163 fatcat:pb5kf2yv7jbyfhtmpxwvrmtfdm

Automation bias: a systematic review of frequency, effect mediators, and mitigators

Kate Goddard, Abdul Roudsari, Jeremy C Wyatt
2012 JAMIA Journal of the American Medical Informatics Association  
Automation bias (AB)dthe tendency to over-rely on automationdhas been studied in various academic fields. Clinical decision support systems (CDSS) aim to benefit the clinical decision-making process.  ...  Funding This review was carried out as part of ongoing PhD research funded by the Engineering and Physical Sciences Research Council.  ...  The effect is usually found in a post-hoc analysis of data, and the data reported often show indirect, implicit, evidence of AB.  ... 
doi:10.1136/amiajnl-2011-000089 pmid:21685142 pmcid:PMC3240751 fatcat:lkicvd63jrhwrlxixjoszjlzi4
« Previous Showing results 1 — 15 out of 20,647 results