• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1219
  • 167
  • 134
  • 109
  • 83
  • 70
  • 38
  • 38
  • 36
  • 18
  • 18
  • 12
  • 12
  • 12
  • 12
  • Tagged with
  • 2351
  • 627
  • 546
  • 511
  • 497
  • 348
  • 326
  • 307
  • 294
  • 231
  • 227
  • 216
  • 206
  • 196
  • 178
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Privacy-aware Linked Widgets

Fernandez Garcia, Javier D., Ekaputra, Fajar J., Aryan, Peb Ruswono, Azzam, Amr, Kiesling, Elmar January 2019 (has links) (PDF)
The European General Data Protection Regulation (GDPR) brings new challenges for companies, who must demonstrate that their systems and business processes comply with usage constraints specified by data subjects. However, due to the lack of standards, tools, and best practices, many organizations struggle to adapt their infrastructure and processes to ensure and demonstrate that all data processing is in compliance with users' given consent. The SPECIAL EU H2020 project has developed vocabularies that can formally describe data subjects' given consent as well as methods that use this description to automatically determine whether processing of the data according to a given policy is compliant with the given consent. Whereas this makes it possible to determine whether processing was compliant or not, integration of the approach into existing line of business applications and ex-ante compliance checking remains an open challenge. In this short paper, we demonstrate how the SPECIAL consent and compliance framework can be integrated into Linked Widgets, a mashup platform, in order to support privacy-aware ad-hoc integration of personal data. The resulting environment makes it possible to create data integration and processing workflows out of components that inherently respect usage policies of the data that is being processed and are able to demonstrate compliance. We provide an overview of the necessary meta data and orchestration towards a privacy-aware linked data mashup platform that automatically respects subjects' given consents. The evaluation results show the potential of our approach for ex-ante usage policy compliance checking within the Linked Widgets Platforms and beyond.
132

Arquitetura de ambientes de IPTV com serviços de privacidade. / Architecture for IPTV environments with privacy services.

Fernando Frota Redígolo 25 July 2008 (has links)
A crescente digitalização das mídias, disponibilidade de banda larga e convergência tecnológica possibilitam o surgimento de novos serviços, como o IPTV (Internet Protocol TeleVision), que visa disponibilizar serviços de televisão via TCP/IP sobre uma rede de banda larga privativa. Sem os devidos cuidados, entidades ou indivíduos monitorando o tráfego deste serviço passam a ter uma maior quantidade de informações sobre os indivíduos que os utilizam, muitas vezes violando a privacidade dos mesmos em um ambiente no qual tradicionalmente não há esta preocupação, como a sala de estar ou outro ambiente doméstico. O objetivo deste trabalho é propor uma arquitetura de IPTV que apresente mecanismos capazes de garantir um nível de privacidade maior do que o existente em sistemas de IPTV tradicionais, de maneira a inviabilizar para um observador o correlacionamento entre um usuário do serviço e os conteúdos por ele assistidos. / The increase in media digitalization, broadband availability and technological convergence, allows new services, such as the IPTV (Internet Protocol Television) service, which offers television-related services over a private broadband TCP/IP network. Without proper care, entities or individuals monitoring these services traffic obtain a large amount of information on the service users, and could violate their privacies in an environment in which traditionally there is no such preoccupation, like in a living-room or another domestic environment. The goal of this work is to propose an IPTV architecture capable of guaranteeing a higher privacy level than the existing in traditional IPTV systems, so that it is not viable for an observer to correlate a service user with the content he/she watches.
133

A Privacy Conscious Bluetooth Infrastructure for Location Aware Computing

Huang, Albert, Rudolph, Larry 01 1900 (has links)
We present a low cost and easily deployed infrastructure for location aware computing that is built using standard Bluetooth® technologies and personal computers. Mobile devices are able to determine their location to room-level granularity with existing bluetooth technology, and to even greater resolution with the use of the recently adopted bluetooth 1.2 specification, all while maintaining complete anonymity. Various techniques for improving the speed and resolution of the system are described, along with their tradeoffs in privacy. The system is trivial to implement on a large scale – our network covering 5,000 square meters was deployed by a single student over the course of a few days at a cost of less than US$1,000. / Singapore-MIT Alliance (SMA)
134

Social-based trustworthy data forwarding in vehicular delay tolerant networks

Alganas, Abdulelah 01 March 2011 (has links)
Vehicular ad hoc network (VANET) is an emerging new communication technol-ogy which has attracted a lot of research attention from academic community and indus-try. For many applications in VANETs, information has to be transmitted through mul-tiple hops before it reaches its destination that makes it a subject to various security at-tacks and privacy breaches. Thus, security and privacy issues could limit its adaption by the public community. In this study, we propose and evaluate social based trustworthy data forwarding scheme for VANET. First, by using social network analysis techniques, we provide a framework to strategically deploy Road-Side Units (RSUs) infrastructure in order to im-prove reliability, efficiency, and high packet delivery for VANET. It is based on multiple social centrality assessments of street network which help in placing RSUs at high social intersections. This social placement of RSUs will dramatically improve data dissemina-tion as the opportunity of contacting vehicles increase while costs of RSU deployment can be kept under control. Second, we propose a secure and privacy-preserving message forwarding protocol, which utilizes RSUs to forward messages between vehicles. The protocol takes advantage of high performance capability of RSUs to store and forward messages to their destinations, where these RSUs utilize re-encryption technique to form a mix network to provide adequate privacy for senders and receivers. Then detailed anal-ysis in terms of security, message overhead, delivery ratio, and average delay are per-formed to evaluate the efficiency and effectiveness of our proposed scheme. Lastly, we tackled the security and privacy challenges existing in social-aware data diffusion by proposing an efficient vehicle social evaluation (EVSE) scheme. Our scheme enables each vehicle to show its authentic social evaluation to others while not disclosing its past location information. As a result, it can meet the prerequisites for the success of social aware data diffusion in VANETs. / UOIT
135

"'Tis set down so in heaven, but not in earth" : political theology in measure for measure

Goossen, Jonathan T 13 September 2006
One of Measure for Measures central concerns is the changing shape of political theology in Shakespeares England. From its origin until the high middle ages, Christian thought had described the work of the church (the care of souls) and that of the state (the maintenance of the common good) as complementary but essentially different tasks. This division implicitly separated and held in tension the private spiritual obligations of the individual Christian and the public duty of the Christian ruler. This understanding fell under fire in the late middle ages, however, first from the papacy and then from Protestant reformers.<p>Shakespeares Lord Angelo is often linked with this latter groups Puritan faction in England, which was known for its demand that the state enforce private Christian virtue (primarily sexual) as public law. The Duke Vincentio has frequently been described as representative of the more moderate Reformed political thought of Elizabeth I and James I. <p>This thesis argues that in both assuming the disguise of a priest and insisting that a magistrates judgments are only valid if he is himself innocent of the condemneds crime, the Duke shares Angelos and thus the Puritans rejection of the traditional division between the private and public obligations of a Christian ruler. Act V particularly reveals both the similarities between Angelo and the Duke and the fundamental problems of their approach to law. In the end, Isabella is not simply the student of the Dukes political theology but rather the exemplar of how the traditional distinction between the roles of church and state and an individuals private and public moral obligations better defends both personal freedom and the common good.
136

"'Tis set down so in heaven, but not in earth" : political theology in measure for measure

Goossen, Jonathan T 13 September 2006 (has links)
One of Measure for Measures central concerns is the changing shape of political theology in Shakespeares England. From its origin until the high middle ages, Christian thought had described the work of the church (the care of souls) and that of the state (the maintenance of the common good) as complementary but essentially different tasks. This division implicitly separated and held in tension the private spiritual obligations of the individual Christian and the public duty of the Christian ruler. This understanding fell under fire in the late middle ages, however, first from the papacy and then from Protestant reformers.<p>Shakespeares Lord Angelo is often linked with this latter groups Puritan faction in England, which was known for its demand that the state enforce private Christian virtue (primarily sexual) as public law. The Duke Vincentio has frequently been described as representative of the more moderate Reformed political thought of Elizabeth I and James I. <p>This thesis argues that in both assuming the disguise of a priest and insisting that a magistrates judgments are only valid if he is himself innocent of the condemneds crime, the Duke shares Angelos and thus the Puritans rejection of the traditional division between the private and public obligations of a Christian ruler. Act V particularly reveals both the similarities between Angelo and the Duke and the fundamental problems of their approach to law. In the end, Isabella is not simply the student of the Dukes political theology but rather the exemplar of how the traditional distinction between the roles of church and state and an individuals private and public moral obligations better defends both personal freedom and the common good.
137

Anonymous, authentic, and accountable resource management based on the E-cash paradigm

Lam, Tak Cheung 15 May 2009 (has links)
The prevalence of digital information management in an open network has driven the need to maintain balance between anonymity, authenticity and accountability (AAA). Anonymity allows a principal to hide its identity from strangers before trust relationship is established. Authenticity ensures the correct identity is engaged in the transaction even though it is hidden. Accountability uncovers the hidden identity when misbehavior of the principal is detected. The objective of this research is to develop an AAA management framework for secure resource allocations. Most existing resource management schemes are designed to manage one or two of the AAA attributes. How to provide high strength protection to all attributes is an extremely challenging undertaking. Our study shows that the electronic cash (E-cash) paradigm provides some important knowledge bases for this purpose. Based on Chaum-Pederson’s general transferable E-cash model, we propose a timed-zero-knowledge proof (TZKP) protocol, which greatly reduces storage spaces and communication overheads for resource transfers, without compromising anonymity and accountability. Based on Eng-Okamoto’s general divisible E-cash model, we propose a hypercube-based divisibility framework, which provides a sophisticated and flexible way to partition a chunk of resources, with different trade-offs in anonymity protection and computational costs, when it is integrated with different sub-cube allocation schemes. Based on the E-cash based resource management framework, we propose a privacy preserving service oriented architecture (SOA), which allows the service providers and consumers to exchange services without leaking their sensitive data. Simulation results show that the secure resource management framework is highly practical for missioncritical applications in large scale distributed information systems.
138

Changes in use and perception of privacy : exploring differences between heavy and light users of Facebook

Oz, Mustafa, M.A. in Journalism 05 November 2012 (has links)
Information privacy is a paradoxical issue. Especially after Facebook, information privacy has become more important than before. College student Facebook users share a great deal of information on Facebook, and Facebook collects users’personal information. Users’ personal information on Facebook is linked to their identity; therefore negative consequences (privacy problems) have become possible on Facebook. This study focused on college students’ privacy concerns and awareness of privacy issues and settings. Moreover, heavy and light users’ privacy concerns were compared in this study. According to the survey results, privacy is still important to Facebook users and different privacy concerns exist among heavy and light users. Results also show that privacy on Facebook is not a simple thing. It is related to identity construction, users’ experience, and awareness of privacy implications. / text
139

Social Networking And The Employment Relationship: Is Your Boss Creeping Up On You?

Keliher, Michael 23 August 2012 (has links)
There are currently over 900 million Facebook users worldwide (and counting). With increased use of social networking comes new concerns for personal privacy and control of social networking information. More and more, Facebook activity trickles its way into offline contexts, perhaps none more so than the employment context. A new trend in the hiring process is social networking background checks, where some employers go so far as to request a candidate’s Facebook password. Not only this, but the frequency of Facebook activity resulting in employment law disputes is increasing, and has even been found to constitute sufficient grounds for discipline and termination. This thesis examines the current privacy protection given to social networking information in the context of the employment relationship, highlights problems with the current legal landscape in this regard, and offers an emerging theory, New Virtualism, as a conceptual basis for the regulation of this issue going forward.
140

THE INFORMATION ERA THREATENS PRIVACY: A Comparative Study of Electronic Money’s Privacy Policies and Privacy Laws

LIU, GUANRU 27 September 2011 (has links)
This thesis consists of an analysis of electronic money (e-money), e-money’s privacy policies and relevant privacy laws. The value of information and the development of technology enhance the risk of privacy violations in the information era. Consumer privacy interests with respect to e-money are governed in part by the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada and by the European Union’s Data Protection Directive. The analysis is directed at whether the privacy policies of three kinds of e-money – Octopus Card, PayPal and MasterCard – comply with the spirit and letter of these laws. In light of technology change, the laws should be interpreted to apply broadly to protect privacy interests. Enhanced privacy protection may in fact lead to greater adoption of e-money by consumers. / Thesis (Master, Law) -- Queen's University, 2011-09-27 17:53:30.503

Page generated in 0.0442 seconds