The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to a study released this July by Juniper Research, more than half the world's largest companies are now researching blockchain technologies with the goal of integrating them into their products. Projects are already under way that will disrupt the management of health care records, property titles, supply chains, and even our online identities. But before we remount the entire digital ecosystem...
Online Social Networks (OSNs) are becoming increasingly important in our day to day lives. Statistics show that 74% of the Internet users are involved in social networking. Unfortunately many of us are unaware of the threats and vulnerabilities that come with OSNs. These issues can be resolved by using Data Sanitization; the process of disguising sensitive information by overwriting it with realistic...
In privacy sensitive eScience domains the disclosure of data is often not allowed or advised if it contains sensitive data about the individual. Applying data protection methods oppose interests of repeatability and reproducibility, as the data which serves as input and output for processing steps in experiments needs to be altered in order to preserve privacy. We thus discuss pre-requisites and methods...
Location-based services relying on in-vehicle devices are becoming so common that it is likely that, in the near future, devices of some sorts will be installed on new vehicles by default. The pressure for a rapid adoption of these devices and services is not yet counterbalanced by an adequate awareness about system security and data privacy issues. For example, service providers might collect, elaborate...
The widespread use of digital data, storage and sharing for data mining has given data snoopers a big opportunity to collect and match records from multiple sources for identity theft and other privacy-invasion activities. While most healthcare organizations do a good job in protecting their data in their databases, very few organizations take enough precautions to protect data that is shared with...
Voluntary disclosure of personal information is becoming more and more widespread with the advent of Web 2.0 services. Publishing such information constitutes new kinds of threats, such as further reinforcing already existing profiling techniques through correlation of perceived user activities to those publicly disclosed, but the most obvious of all is the intrinsic threat that malicious third parties...
To many users, the data security in Software-as-a-service (SAAS) is troubling, especially the sensitive data security. In this paper, further separation of user data is adopted, allowing users choose another unrelated third-party to provide database services. And the all operations to the data in the database, such as adding, deleting, encryption, are all still directly executed by the relevant software...
For successful privacy engineering, it is critical to guarantee the alignment and compliance among privacy artifacts produced during privacy-aware software development. In this paper, we propose a privacy compliance engineering flow in which we discuss the involved privacy artifacts and their alignment, refinement, and compliance verification. Within a case study, we identify the privacy artifacts...
This paper introduces the concepts of e-commerce privacy, security risk of e-commerce privacy, and present status of security risk of e-commerce privacy, analyzes the causes of security risks of e-commerce privacy in six aspects: humanity, environment, infrastructure, logical entities, security mechanisms, security services and applications, and gives the corresponding preventive strategies for e-commerce...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
A honeypot is a type of information system that is used to obtain information on intruders in a network. When a honeypot is deployed in front of a firewall, it can serve as an early warning system. When deployed behind the firewall, it can serve as part of a defense-in-depth system and can be used to detect attackers who bypass the firewall and the intrusion detection system (IDS) or threats from...
Worst case execution time analysis based on measurements requires large test suites to obtain reliable numbers. We are thus developing tools to efficiently generate these test sets in a whitebox-testing approach. To make project progress measurable and guard against regressions, a benchmarking suite is sought for. We present a set of requirements that have been collected and outline the design of...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
Notice of Violation of IEEE Publication Principles"A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining"in the 2006 Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA??06)After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.