نتایج جستجو برای: privacy protection

تعداد نتایج: 218145  

2014
Chao Yu Yuliang Shi

With the development of cloud computing, more and more service providers deploy multitenant applications to the cloud. Multi-tenant data is stored by non-fully trusted SaaS service providers, and the protection of data privacy attracts more attention. This paper proposes a privacy protection strategy customization framework. This framework considers the privacy protection needs, SaaS applicatio...

2013
Pavel Korshunov Touradj Ebrahimi

In this paper, we describe EPFL privacy protection tool submitted to the MediaEval 2013 Visual Privacy task. The goal of the task is to obscure faces and other personal items of people in the provided surveillance clips to preserve their personal privacy. In the privacy protection tool, we used a combination of reversible privacy protection filter based on geometric warping transformation, rand...

Journal: :JNW 2012
Feng Gao Jingsha He Shunan Ma

In pervasive computing environments, resources and services are usually provided by a variety of different suppliers with multiple computing devices and from heterogeneous networks. Accordingly, various privacy protection methods with lots of privacy policies were used. Before some meaningful interaction starts or services offers, a certain level of trust must be established, this trust establi...

2004

This Working Party was set up under Article 29 of Directive 95/46/EC. It is an independent European advisory body on data protection and privacy. Its tasks are described in Article 30 of Directive 95/46/EC and Article 14 of Directive 97/66/EC.

2012
Carla Ilten Daniel Guagnin Leon Hempel

This paper aims to provide a critical contribution to the ongoing discourse on self-regulation with regard to privacy and data protection. This discourse encompasses the amendment of the EU Data Protection Directive and the related discussion about a principle of accountability. Underlying these conceptualisations is the assumption that data protection law is generally observed, but could be si...

2007
Isabelle Oomen Ronald E. Leenes

Several opinion polls have reported that many people claim to be concerned about their privacy, yet that most people in fact do very little to protect their privacy. Are privacy concerns indeed insufficient motivators to adopt privacy protection strategies? What then characterizes the users of these strategies? On the basis of a large scale survey amongst Dutch students, this paper explores the...

Journal: :JNW 2012
Jingjun Miao Liangmin Wang

Mobile nodes in the Internet of things often move from one cluster to another, in which cryptography based protocols are required to provide rapid identification authentication and privacy protection. A single-step protocol was presented for the occasion that the mobile node joins a new cluster. The presented protocol contains a valid request message and an answer authentication message, which ...

2006
Gilda Pour

Security and privacy issues have become far more critical and complex in the Internet era. Balancing security enhancement and privacy protection remains a key challenge involving both technical and non-technical issues. It is crucial to restructure computer and software engineering curricula to familiarize students with the challenges and opportunities associated with the security and privacy i...

2014
Li Chen Hui Zhu Hongwei Liu

E-business enterprises provide personalize services for customers based on their privacy information. However, customers benefit from personalization while suffering from privacy concern. The tradeoff between consumers’ benefit function and firms’ earnings function are explored when an incumbent adopts privacy protection in perfect monopoly market. It also found that when the potential entrant ...

2011
Martin Kost Björn Wiedersheim Stefan Dietzel Florian Schaub Tobias Bachmor PRECIOSA PERA

Cooperative Intelligent Transportation Systems must incorporate privacy enhancing mechanisms to gain acceptance by all involved parties. The PRECIOSA Privacy-enforcing Runtime Architecture (PeRA) provides a holistic privacy protection approach, which implements user-defined privacy policies. A data-centric protection chain ensures that ITS components process data according to attached privacy p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید