• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1241
  • 167
  • 137
  • 109
  • 83
  • 70
  • 38
  • 38
  • 36
  • 21
  • 18
  • 12
  • 12
  • 12
  • 12
  • Tagged with
  • 2389
  • 643
  • 558
  • 523
  • 509
  • 352
  • 333
  • 308
  • 299
  • 235
  • 235
  • 218
  • 210
  • 199
  • 183
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
611

The development of the right to privacy under the ECHR : A study on the effect of Article 8 on third parties

Westlund, Martin January 2018 (has links)
No description available.
612

Uma abordagem distribuída para preservação de privacidade na publicação de dados de trajetória / A distributed approach for privacy preservation in the publication of trajectory data

Brito, Felipe Timbó January 2016 (has links)
BRITO, Felipe Timbó. Uma abordagem distribuída para preservação de privacidade na publicação de dados de trajetória. 2016. 66 f. Dissertação (mestrado em computação)- Universidade Federal do Ceará, Fortaleza-CE, 2016. / Submitted by Elineudson Ribeiro (elineudsonr@gmail.com) on 2016-03-31T18:54:31Z No. of bitstreams: 1 2016_dis_ftbrito.pdf: 3114981 bytes, checksum: 501bbf667d876e76c74a7911fc7b2c3b (MD5) / Approved for entry into archive by Rocilda Sales (rocilda@ufc.br) on 2016-04-25T12:34:13Z (GMT) No. of bitstreams: 1 2016_dis_ftbrito.pdf: 3114981 bytes, checksum: 501bbf667d876e76c74a7911fc7b2c3b (MD5) / Made available in DSpace on 2016-04-25T12:34:13Z (GMT). No. of bitstreams: 1 2016_dis_ftbrito.pdf: 3114981 bytes, checksum: 501bbf667d876e76c74a7911fc7b2c3b (MD5) Previous issue date: 2016 / Advancements in mobile computing techniques along with the pervasiveness of location-based services have generated a great amount of trajectory data. These data can be used for various data analysis purposes such as traffic flow analysis, infrastructure planning, understanding of human behavior, etc. However, publishing this amount of trajectory data may lead to serious risks of privacy breach. Quasi-identifiers are trajectory points that can be linked to external information and be used to identify individuals associated with trajectories. Therefore, by analyzing quasi-identifiers, a malicious user may be able to trace anonymous trajectories back to individuals with the aid of location-aware social networking applications, for example. Most existing trajectory data anonymization approaches were proposed for centralized computing environments, so they usually present poor performance to anonymize large trajectory data sets. In this work we propose a distributed and efficient strategy that adopts the $k^m$-anonymity privacy model and uses the scalable MapReduce paradigm, which allows finding quasi-identifiers in larger amount of data. We also present a technique to minimize the loss of information by selecting key locations from the quasi-identifiers to be suppressed. Experimental evaluation results demonstrate that our proposed approach for trajectory data anonymization is more scalable and efficient than existing works in the literature. / Avanços em técnicas de computação móvel aliados à difusão de serviços baseados em localização têm gerado uma grande quantidade de dados de trajetória. Tais dados podem ser utilizados para diversas finalidades, tais como análise de fluxo de tráfego, planejamento de infraestrutura, entendimento do comportamento humano, etc. No entanto, a publicação destes dados pode levar a sérios riscos de violação de privacidade. Semi-identificadores são pontos de trajetória que podem ser combinados com informações externas e utilizados para identificar indivíduos associados à sua trajetória. Por esse motivo, analisando semi-identificadores, um usuário malicioso pode ser capaz de restaurar trajetórias anonimizadas de indivíduos por meio de aplicações de redes sociais baseadas em localização, por exemplo. Muitas das abordagens já existentes envolvendo anonimização de dados foram propostas para ambientes de computação centralizados, assim elas geralmente apresentam um baixo desempenho para anonimizar grandes conjuntos de dados de trajetória. Neste trabalho propomos uma estratégia distribuída e eficiente que adota o modelo de privacidade km-anonimato e utiliza o escalável paradigma MapReduce, o qual permite encontrar semi-identificadores em um grande volume de dados. Nós também apresentamos uma técnica que minimiza a perda de informação selecionando localizações chaves a serem removidas a partir do conjunto de semi-identificadores. Resultados de avaliação experimental demonstram que nossa solução de anonimização é mais escalável e eficiente que trabalhos já existentes na literatura.
613

UbiPri : middleware para controle e gerenciamento de privacidade em ambientes ubíquos / UBiPri : middleware control and privacy management in ubiquitous environments

Leithardt, Valderi Reis Quietinho January 2015 (has links)
Atualmente em vários países já existem mais dispositivos e meios de comunicações que habitantes e a medida que a tecnologia avança a troca de informação tende a aumentar exponencialmente. Com isso, ganha destaque a área denominada computação ubíqua, que visa o desenvolvimento de aplicativos para automatizar processos, antes manuais, a fim de proporcionar conforto, rapidez e conexão aos usuários com seus dispositivos. Nos estudos realizados decorrer desta tese identificou–se a necessidade de desenvolver e controlar informações privadas fundamentadas no local, aqui denominado ambiente ubíquo. O problema de pesquisa identificado foi a grande heterogeneidade de dispositivos e comunicações nestes sistemas, tornando-os vulneráveis e expondo os dados de seus usuários. Assim, observou-se a necessidade de um modelo taxonômico de privacidade que engloba características necessárias para controlar e gerenciar a privacidade de dados em ambientes ubíquos. A partir dessa taxonomia desenvolveu–se um protótipo com base em um middleware estruturado em camadas necessárias para prover os controles e gerenciamentos necessários nestes ambientes. Os primeiros testes e resultados se mostraram promissores, tendo seus resultados publicados em conferências internacionais da área que nortearam os estudos para uma melhoria do tratamento e filtragem de dados. Também foi possível a ampliação dos controles e gerenciamento de parâmetros automáticos com aumento e redução de definição do tipo de perfil do usuário em adição são apresentados os resultados obtidos em diferentes cenários de uso e aplicação. Para tanto, o protótipo desenvolvido permite selecionar opções de variáveis atribuídas individualmente a cada ambiente de acordo com suas necessidades, com isso, a solução proposta visa ser empregada no gerenciamento de privacidade em ambientes ubíquos. Os resultados obtidos nos testes realizados comprovam a viabilidade e contribuição cientifica do modelo desenvolvido. O aplicativo UbiPri foi disponibilizado para utilização no google play store, podendo ser instalado e configurado na plataforma android. / Currently in many countries there are already more devices and communication means inhabitants and as technology advances the exchange of information tends to increase exponentially. As a result, stands out the area called ubiquitous computing, which aims to develop applications to automate processes before hand in order to provide comfort, speed and connecting users with their devices. In studies carried out throughout this thesis it identified the need to develop and control private information based on location, here called ubiquitous environment. The identified research problem was the great heterogeneity of devices and communications in these systems, making them vulnerable and exposing the data of its users. Thus, there was the need for a taxonomic model of privacy that encompasses features needed to control and manage data privacy in ubiquitous environments. From this taxonomy developed a prototype based on a middleware structured in layers to provide the necessary controls and managements required in these environments. The first tests and results were promising, with the results published in international conferences in the area that guided the studies for improved treatment and filtering of data. It was also possible the expansion of controls and management parameters with automatic increase and decrease setting in the user profile type in addition the results obtained are presented in different usage scenarios and application. Thus, the prototype allows you to select options variables individually assigned to each environment according to their needs, with it, the proposed solution is intended to be used in the privacy management in ubiquitous environments. The results obtained in the tests prove the feasibility and scientific contribution of the developed model. The UbiPri application was made available for use in the google play store and can be installed and configured on android platform.
614

La prise en compte de la vie privée dans l’innovation technologique / Taking Privacy into Account within Technological Innovations

Jammet, Adrien 14 February 2018 (has links)
L’étude de la prise en compte de la vie privée dans l’innovation technologique est celle du régime juridique applicable aux données à caractère personnel. Cependant, la complexité contextuelle du sujet impose une analyse pragmatique, intégrant les éléments économiques et technologiques pour définir l’utilisation effective du droit dans et par l’innovation numérique. Cela passe nécessairement par une approche phénoménologique, expliquant le cheminement juridique qui a conduit le législateur à choisir une telle forme de protection, passant d’un droit au respect de la vie privée général à un régime spécifique applicable aux données à caractère personnel, puis à une observation de son efficacité à protéger l’essence de la vie privée. Au coeur de ce travail se trouve la volonté d’apporter des éléments de réponse objectifs permettant d’expliquer l’écart existant entre la faible confiancedu public accordée à la technologie en matière de respect de la vie privée, et les déclarations des législateurs sur l’efficacité des textes protecteurs. Alors que le consentement se trouve être la pierre angulaire du nouveau règlement général sur la protection des données, cette divergence mérite d’être analysée sur un plan juridique. Dès lors, on peut résumer cette thèse à une interrogation: quelle est l’efficacité réelle du régime de protection de la vie privée dans l’innovation technologique ? / The study of privacy within technological innovations is the study of the legal system surrounding personal data. However, the complexity and context of the subject imposes a pragmatic analysis, gathering elements of economy and technology, to define the reality of the use of the law by and within numerical innovations. As such, it necessitates a phenomenological approach, reviewing the historical steps that lead to the particular set of protections that the legislator has chosen, from a general protection of privacy towards a special regime applicable to personal data, and then an observation of its effectiveness to protect the essence of privacy. At the center of this work, we can find the will to understandthe gap between the trust given by the public to technology regarding the respect of one’s privacy and the declarations of legislators on the efficiency of the legislative response. Since the consent is the core principle of these regulations, this divergence deserves a legal analysis. Consequently, we can sum this thesis by a simple question: what it the real efficiency of privacy’s protection regime facing technological innovations ?
615

Direito à intimidade genética na relação de emprego

Andrade, Carlos Frederico Guerra January 2008 (has links)
Submitted by Ana Valéria de Jesus Moura (anavaleria_131@hotmail.com) on 2014-09-08T20:27:20Z No. of bitstreams: 18 Capa.pdf: 9787 bytes, checksum: af8a511e227c90229121dc3ce8d9ee99 (MD5) Agradecimentos.pdf: 11758 bytes, checksum: d1067720ab3ad177fd34f3d0d3f429ec (MD5) Abstract.pdf: 6355 bytes, checksum: 562db8b7f7eb3e00bfe245649ce3e4d5 (MD5) Dedicatória.pdf: 3257 bytes, checksum: 4f057064c2b5c8826b57d0e02821657e (MD5) DECRETO Nº 6.042.pdf: 37965 bytes, checksum: af0361d79005ad06e4d0d5a4b6a9eb22 (MD5) Dissertação Final.pdf: 451582 bytes, checksum: 349ef0f480ba9549d7851bcf99313db5 (MD5) Folhaderosto.pdf: 4558 bytes, checksum: f067e613b1d902e8f8386308e9396593 (MD5) HC 71373-4 - Leading Case.pdf: 2471602 bytes, checksum: ca960fd4fad97e6192feed9b09f345b7 (MD5) HC 76060-4.pdf: 285231 bytes, checksum: c6e0423dd380fc3e61fa8ba7a74da453 (MD5) INSTRUÇÃO NORMATIVA INSS 16.pdf: 25109 bytes, checksum: b5fa5317b17a62ec4b7fd8477395f8eb (MD5) Mensagens introdutórias.pdf: 3543 bytes, checksum: 46ef319aab4adc7c9e5bf5fb96901795 (MD5) MPS Nº 457 DE 22.11.2007.pdf: 8379 bytes, checksum: 523f719c9136edb650ffaccbeae8dddd (MD5) MPS Nº 457 DE 22.11.2007.pdf: 8379 bytes, checksum: 523f719c9136edb650ffaccbeae8dddd (MD5) Reclamação - STF - 2040-1 - Glória Trevi.pdf: 3674637 bytes, checksum: 632ef3f0eee87ff23ab2328a9b33363a (MD5) Referências.pdf: 31063 bytes, checksum: d48b8d5d615a6b32f904389c1282c9f0 (MD5) Resumo Língua Portuguesa.pdf: 6829 bytes, checksum: ce335c7a63c55ca2651e0f5908edb8a4 (MD5) Sumário.pdf: 15918 bytes, checksum: dc6638142cab74f522d0846e2dfd8769 (MD5) Termo de aprovação.pdf: 6915 bytes, checksum: 4258a8ece89fc3652301a6fc4b5c2d7a (MD5) / Approved for entry into archive by Ana Valéria de Jesus Moura (anavaleria_131@hotmail.com) on 2014-09-08T20:28:02Z (GMT) No. of bitstreams: 18 Capa.pdf: 9787 bytes, checksum: af8a511e227c90229121dc3ce8d9ee99 (MD5) Agradecimentos.pdf: 11758 bytes, checksum: d1067720ab3ad177fd34f3d0d3f429ec (MD5) Abstract.pdf: 6355 bytes, checksum: 562db8b7f7eb3e00bfe245649ce3e4d5 (MD5) Dedicatória.pdf: 3257 bytes, checksum: 4f057064c2b5c8826b57d0e02821657e (MD5) DECRETO Nº 6.042.pdf: 37965 bytes, checksum: af0361d79005ad06e4d0d5a4b6a9eb22 (MD5) Dissertação Final.pdf: 451582 bytes, checksum: 349ef0f480ba9549d7851bcf99313db5 (MD5) Folhaderosto.pdf: 4558 bytes, checksum: f067e613b1d902e8f8386308e9396593 (MD5) HC 71373-4 - Leading Case.pdf: 2471602 bytes, checksum: ca960fd4fad97e6192feed9b09f345b7 (MD5) HC 76060-4.pdf: 285231 bytes, checksum: c6e0423dd380fc3e61fa8ba7a74da453 (MD5) INSTRUÇÃO NORMATIVA INSS 16.pdf: 25109 bytes, checksum: b5fa5317b17a62ec4b7fd8477395f8eb (MD5) Mensagens introdutórias.pdf: 3543 bytes, checksum: 46ef319aab4adc7c9e5bf5fb96901795 (MD5) MPS Nº 457 DE 22.11.2007.pdf: 8379 bytes, checksum: 523f719c9136edb650ffaccbeae8dddd (MD5) MPS Nº 457 DE 22.11.2007.pdf: 8379 bytes, checksum: 523f719c9136edb650ffaccbeae8dddd (MD5) Reclamação - STF - 2040-1 - Glória Trevi.pdf: 3674637 bytes, checksum: 632ef3f0eee87ff23ab2328a9b33363a (MD5) Referências.pdf: 31063 bytes, checksum: d48b8d5d615a6b32f904389c1282c9f0 (MD5) Resumo Língua Portuguesa.pdf: 6829 bytes, checksum: ce335c7a63c55ca2651e0f5908edb8a4 (MD5) Sumário.pdf: 15918 bytes, checksum: dc6638142cab74f522d0846e2dfd8769 (MD5) Termo de aprovação.pdf: 6915 bytes, checksum: 4258a8ece89fc3652301a6fc4b5c2d7a (MD5) / Made available in DSpace on 2014-09-08T20:28:02Z (GMT). No. of bitstreams: 18 Capa.pdf: 9787 bytes, checksum: af8a511e227c90229121dc3ce8d9ee99 (MD5) Agradecimentos.pdf: 11758 bytes, checksum: d1067720ab3ad177fd34f3d0d3f429ec (MD5) Abstract.pdf: 6355 bytes, checksum: 562db8b7f7eb3e00bfe245649ce3e4d5 (MD5) Dedicatória.pdf: 3257 bytes, checksum: 4f057064c2b5c8826b57d0e02821657e (MD5) DECRETO Nº 6.042.pdf: 37965 bytes, checksum: af0361d79005ad06e4d0d5a4b6a9eb22 (MD5) Dissertação Final.pdf: 451582 bytes, checksum: 349ef0f480ba9549d7851bcf99313db5 (MD5) Folhaderosto.pdf: 4558 bytes, checksum: f067e613b1d902e8f8386308e9396593 (MD5) HC 71373-4 - Leading Case.pdf: 2471602 bytes, checksum: ca960fd4fad97e6192feed9b09f345b7 (MD5) HC 76060-4.pdf: 285231 bytes, checksum: c6e0423dd380fc3e61fa8ba7a74da453 (MD5) INSTRUÇÃO NORMATIVA INSS 16.pdf: 25109 bytes, checksum: b5fa5317b17a62ec4b7fd8477395f8eb (MD5) Mensagens introdutórias.pdf: 3543 bytes, checksum: 46ef319aab4adc7c9e5bf5fb96901795 (MD5) MPS Nº 457 DE 22.11.2007.pdf: 8379 bytes, checksum: 523f719c9136edb650ffaccbeae8dddd (MD5) MPS Nº 457 DE 22.11.2007.pdf: 8379 bytes, checksum: 523f719c9136edb650ffaccbeae8dddd (MD5) Reclamação - STF - 2040-1 - Glória Trevi.pdf: 3674637 bytes, checksum: 632ef3f0eee87ff23ab2328a9b33363a (MD5) Referências.pdf: 31063 bytes, checksum: d48b8d5d615a6b32f904389c1282c9f0 (MD5) Resumo Língua Portuguesa.pdf: 6829 bytes, checksum: ce335c7a63c55ca2651e0f5908edb8a4 (MD5) Sumário.pdf: 15918 bytes, checksum: dc6638142cab74f522d0846e2dfd8769 (MD5) Termo de aprovação.pdf: 6915 bytes, checksum: 4258a8ece89fc3652301a6fc4b5c2d7a (MD5) / A dissertação aborda o direito à intimidade genética na relação de emprego. Inicia fazendo uma abordagem dos direitos da personalidade, sua definição, características e classificação, para, em seguida, enfrentar a questão propriamente dita da intimidade genética. Ao analisar este tema, são levantadas diversas problemáticas, tais como definição, características e forma de acesso ao genoma humano; os elementos, a natureza jurídica, os sujeitos e limites da intimidade genética; as discussões atinentes às provas genéticas e à própria medicina preditiva ou genômica. Para fundamentar a existência de um direito à intimidade genética, são colacionados as Declarações, Resoluções, Recomendações e Convenções Internacionais e em especial, os artigos da Constituição Federal de 1988 asseguradores deste direito. Analisa-se, a seguir, o direito à intimidade genética na relação de emprego, fazendo um estudo dos artigos da CLT, da NR-7 e da Lei 11.430/2006 em face de temas bioéticos como vulnerabilidade, consentimento livre e esclarecido, obtenção e utilização de informações genéticas, confidencialidade e sigilo dos resultados. Tais questões são contrapostas a temas próprios do Direito do Trabalho como a obrigação do empregador de realizar exames médicos; a preservação e a segurança do meio ambiente de trabalho; a liberdade de contratar do empregador. Ante esta colisão de direitos, aponta-se a resolução do conflito mediante a ponderação de interesses, através da utilização dos princípios da razoabilidade e da proporcionalidade. Ao final, sustenta-se a existência de um direito à intimidade genética na relação de emprego, apontando-se, entretanto, critérios objetivos para a sua realização.
616

Quantitative bounds on the security-critical resource consumption of JavaScript apps

Franzen, Daniel January 2016 (has links)
Current resource policies for mobile phone apps are based on permissions that unconditionally grant or deny access to a resource like private data, sensors and services. In reality, the legitimacy of an access may be context-dependent - for example, depending on how often a resource is accessed and in which situation. This thesis presents research into providing bounds on the access of JavaScript apps to security and privacy-relevant resources on mobile devices. The investigated bounds are quantitative and interaction-dependent: for example, permitting one access each time the user presses a specified button. Two novel systems are presented with different approaches to providing these bounds. The system PhoneWrap injects a quantitative policy into an app and enforces the bound dynamically during runtime by monitoring the resource consumption and the user interaction. If the injected bound is exceeded, the resource request is replaced by a deny action. This way, PhoneWrap restricts the unwanted behaviour while the expected functionality can be performed. Policies for this system describe the UI elements which trigger the expected resource consumption and the number of resource units consumed for each interaction. The enforcement of the policies is achieved via wrapping the critical APIs using JavaScript internal features. The injection of a policy can be performed automatically. PhoneWrap is the first system using the lightweight wrapping method to inject policies directly into mobile apps and the first to combine quantitative policies with interaction-dependencies. The second system AmorJiSe statically analyses the resource consumption of a given JavaScript program. This system automatically infers amortised annotations on top of given JavaScript data types. The amortised annotations symbolise reserved resource units stored in the data structures. This way the amount of resource units available to the app is expressed dependent on the size of the data structures. The resulting function types of the UI handlers can be used to extract interaction-dependent bounds. The correctness of these bounds is proven in relation to a resource-aware operational semantics. AmorJiSe extends the known amortised type paradigm to JavaScript with its dynamic object structures and applies this paradigm to the novel domain of mobile resources. Although, the two systems are based on similar resource models and produce similar resource bounds, they use different methods with different properties which are presented in this dissertation.
617

Privacy Preserving Controls for Android Applications

January 2014 (has links)
abstract: Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and performing forensics on application behavior. This research sheds light on several security aspects, including the use of inter-process communications (IPC) to perform permission re-delegation attacks. Android permission system is more of app-driven rather than user controlled, which means it is the applications that specify their permission requirement and the only thing which the user can do is choose not to install a particular application based on the requirements. Given the all or nothing choice, users succumb to pressures and needs to accept permissions requested. This thesis proposes a couple of ways for providing the users finer grained control of application privileges. The same methods can be used to evade the Permission Re-delegation attack. This thesis also proposes and implements a novel methodology in Android that can be used to control the access privileges of an Android application, taking into consideration the context of the running application. This application-context based permission usage is further used to analyze a set of sample applications. We found the evidence of applications spoofing or divulging user sensitive information such as location information, contact information, phone id and numbers, in the background. Such activities can be used to track users for a variety of privacy-intrusive purposes. We have developed implementations that minimize several forms of privacy leaks that are routinely done by stock applications. / Dissertation/Thesis / Masters Thesis Computer Science 2014
618

Secure and Privacy-Preserving Microblogging Services: Attacks and Defenses

January 2016 (has links)
abstract: Microblogging services such as Twitter, Sina Weibo, and Tumblr have been emerging and deeply embedded into people's daily lives. Used by hundreds of millions of users to connect the people worldwide and share and access information in real-time, the microblogging service has also became the target of malicious attackers due to its massive user engagement and structural openness. Although existed, little is still known in the community about new types of vulnerabilities in current microblogging services which could be leveraged by the intelligence-evolving attackers, and more importantly, the corresponding defenses that could prevent both the users and the microblogging service providers from being attacked. This dissertation aims to uncover a number of challenging security and privacy issues in microblogging services and also propose corresponding defenses. This dissertation makes fivefold contributions. The first part presents the social botnet, a group of collaborative social bots under the control of a single botmaster, demonstrate the effectiveness and advantages of exploiting a social botnet for spam distribution and digital-influence manipulation, and propose the corresponding countermeasures and evaluate their effectiveness. Inspired by Pagerank, the second part describes TrueTop, the first sybil-resilient system to find the top-K influential users in microblogging services with very accurate results and strong resilience to sybil attacks. TrueTop has been implemented to handle millions of nodes and 100 times more edges on commodity computers. The third and fourth part demonstrate that microblogging systems' structural openness and users' carelessness could disclose the later's sensitive information such as home city and age. LocInfer, a novel and lightweight system, is presented to uncover the majority of the users in any metropolitan area; the dissertation also proposes MAIF, a novel machine learning framework that leverages public content and interaction information in microblogging services to infer users' hidden ages. Finally, the dissertation proposes the first privacy-preserving social media publishing framework to let the microblogging service providers publish their data to any third-party without disclosing users' privacy and meanwhile meeting the data's commercial utilities. This dissertation sheds the light on the state-of-the-art security and privacy issues in the microblogging services. / Dissertation/Thesis / Doctoral Dissertation Electrical Engineering 2016
619

Security and Privacy in Mobile Computing: Challenges and Solutions

January 2017 (has links)
abstract: Mobile devices are penetrating everyday life. According to a recent Cisco report [10], the number of mobile connected devices such as smartphones, tablets, laptops, eReaders, and Machine-to-Machine (M2M) modules will hit 11.6 billion by 2021, exceeding the world's projected population at that time (7.8 billion). The rapid development of mobile devices has brought a number of emerging security and privacy issues in mobile computing. This dissertation aims to address a number of challenging security and privacy issues in mobile computing. This dissertation makes fivefold contributions. The first and second parts study the security and privacy issues in Device-to-Device communications. Specifically, the first part develops a novel scheme to enable a new way of trust relationship called spatiotemporal matching in a privacy-preserving and efficient fashion. To enhance the secure communication among mobile users, the second part proposes a game-theoretical framework to stimulate the cooperative shared secret key generation among mobile users. The third and fourth parts investigate the security and privacy issues in mobile crowdsourcing. In particular, the third part presents a secure and privacy-preserving mobile crowdsourcing system which strikes a good balance among object security, user privacy, and system efficiency. The fourth part demonstrates a differentially private distributed stream monitoring system via mobile crowdsourcing. Finally, the fifth part proposes VISIBLE, a novel video-assisted keystroke inference framework that allows an attacker to infer a tablet user's typed inputs on the touchscreen by recording and analyzing the video of the tablet backside during the user's input process. Besides, some potential countermeasures to this attack are also discussed. This dissertation sheds the light on the state-of-the-art security and privacy issues in mobile computing. / Dissertation/Thesis / Doctoral Dissertation Electrical Engineering 2017
620

The conflict of interest between data sharing and data privacy : a middleware approach

Molema, Karabo Omphile January 2016 (has links)
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016. / People who are referred to as data owners in this study, use the Internet for various purposes and one of those is using online services like Gmail, Facebook, Twitter and so on. These online services are offered by organizations which are referred to as data controllers. When data owners use these service provided by data controllers they usually have to agree to the terms and conditions which gives data controllers indemnity against any privacy issues that may be raised by the data owner. Data controllers are then free to share that data with any other organizations, referred to as third parties. Though data controllers are protected from lawsuits it does not necessarily mean they are free of any act that may be considered a privacy violation by the data owner. This thesis aims to arrive at a design proposition using the design science research paradigm for a middleware extension, specifically focused on the Tomcat server which is a servlet engine running on the JVM. The design proposition proposes a client side annotation based API to be used by developers to specify classes which will carry data outside the scope of the data controller's system to a third party system, the specified classes will then have code weaved in that will communicate with a Privacy Engine component that will determine based on data owner's preferences if their data should be shared or not. The output of this study is a privacy enhancing platform that comprises of three components the client side annotation based API used by developers, an extension to Tomcat and finally a Privacy Engine.

Page generated in 0.0308 seconds