• Aucun résultat trouvé

[PDF] Top 20 Privacy by Design: From Technologies to Architectures (Position Paper)

Has 10000 "Privacy by Design: From Technologies to Architectures (Position Paper)" found on our website. Below are the top 20 most common "Privacy by Design: From Technologies to Architectures (Position Paper)".

Privacy by Design: From Technologies to Architectures (Position Paper)

Privacy by Design: From Technologies to Architectures (Position Paper)

... tice, architectures are often described in a pictorial way, using different kinds of graphs with legends defining the meaning of nodes and vertices, or semi-formal representations such as UML diagrams (class ... Voir le document complet

18

Design of PriServ, A Privacy Service for DHTs

Design of PriServ, A Privacy Service for DHTs

... equal to or higher than the one specified in the corresponding privacy policy, data are ...order to find the trust level of requesting peers, the provider searches the trust value locally in its trust ... Voir le document complet

6

Privacy Architectures: Reasoning About Data Minimisation and Integrity

Privacy Architectures: Reasoning About Data Minimisation and Integrity

... engineering privacy by design, software architectures and protocols, and epistemic ...for privacy by design. As far as privacy mechanisms are concerned, [19,23] ... Voir le document complet

17

The right to privacy through the development of smart technologies : how our personal health data is affected

The right to privacy through the development of smart technologies : how our personal health data is affected

... allow to share with them, to a certain ...of privacy. As an example, the police has partnered up with Amazon to be able to “download videos captured by homeowners’ Ring doorbell ... Voir le document complet

171

From speech privacy to speech security

From speech privacy to speech security

... SPEECH PRIVACY CRITERIA FOR OPEN-PLAN OFFICES IRC-NRC recently carried out a large multi-disciplinary project to investigate the often- interacting acoustical, lighting and air quality requirements for an ... Voir le document complet

17

The legality of online Privacy-Enhancing Technologies

The legality of online Privacy-Enhancing Technologies

... expect to be able to buy products easily from home over the Internet and have access to all kinds of information ...able to assemble comprehensive profiles about online ...used ... Voir le document complet

29

Semantic web technologies to reconcile privacy and context awareness

Semantic web technologies to reconcile privacy and context awareness

... ways to provide users with higher levels of personalization that capture different elements of a user's operating context, such as her location, the task that she is currently en- gaged in, who her colleagues are, ... Voir le document complet

28

Semantic web technologies to reconcile privacy and context awareness

Semantic web technologies to reconcile privacy and context awareness

... hoc architectures and representations, it was quickly recognized that separating the process of acquiring contextual information from actual context-aware applications was key to facilitating ... Voir le document complet

37

Scenarchitectures: The Use of Domain-Specific Architectures to Bridge Design and Implementation

Scenarchitectures: The Use of Domain-Specific Architectures to Bridge Design and Implementation

... CladiBubble design team collaboratively creating an ASUR ...taken by ASUR and Fiia show that a wide range of techniques are appropriate for different classes of architectural ...is from a static ... Voir le document complet

19

Privacy management architectures for e-services

Privacy management architectures for e-services

... With privacy-friendly business processes and privacy-enabling security technology, IBM EPA provides a methodology for enterprises to enhance privacy protection for their ...of privacy ... Voir le document complet

50

From Collaborative to Privacy Preserving Sequential Pattern Mining

From Collaborative to Privacy Preserving Sequential Pattern Mining

... of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent ...primarily by the growing mistrust of ... Voir le document complet

23

Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems

Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems

... computed by the issuer from all the ref- erences, using the function DB ∈ F ...initiated by the terminal receiving as input a raw biometric data rd from the ...bs from rd using the ... Voir le document complet

16

Towards end-to-end privacy for publish/subscribe architectures in the Internet of Things

Towards end-to-end privacy for publish/subscribe architectures in the Internet of Things

... sent to local ...registering to the service, bathers send their ...far from the ...users to be able to revoke their consent at anytime; bathers may loose their geolocation device in the ... Voir le document complet

8

Nouvelles Architectures Hybrides : Logique / Mémoires Non-Volatiles et technologies associées.

Nouvelles Architectures Hybrides : Logique / Mémoires Non-Volatiles et technologies associées.

... translate to a spread on the discharge-time (t dsc ) of the ...lead to different initial state of C mem , thus making the firing of the neuron ...required to charge back the V mem to the level ... Voir le document complet

174

Towards a Process to Design Architectures of Service-Oriented Robotic Systems

Towards a Process to Design Architectures of Service-Oriented Robotic Systems

... Due to this high demand, robotic systems used to control robots are becoming larger and more complex, creating a great challenge to the develop- ment of this special type of software ...evolved ... Voir le document complet

9

Biofuels Production from Biomass by Thermochemical Conversion Technologies.

Biofuels Production from Biomass by Thermochemical Conversion Technologies.

... order to provide better heat transfer, entrapment of char particles, and temperature control, sand/carrier material is also entrained along with fluidizing gas to increase attrition/abrasion of biomass ... Voir le document complet

18

Technologies and Architectures for Future IP Television Services

Technologies and Architectures for Future IP Television Services

... owing to the decisions made at the different stakeholders: content provider, CDN, crossed ISPs and client ...try to infer, from the clients’ feedback, their own statistics about their CDNs and ISPs ... Voir le document complet

22

From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions

From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions

... attempts to understand something to a level where it can be used effectively, and such models can be quite effective when faced with complex ...tendency to create models by either guiding ... Voir le document complet

21

Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures

Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures

... approaches to privacy are concerned, two main categories can be iden- tified: the qualitative approach and the quantitative ...used to define systems and to express privacy prop- ... Voir le document complet

28

Recent advances in metalloporphyrin-based catalyst design towards carbon dioxide reduction: from bio-inspired second coordination sphere modifications to hierarchical architectures

Recent advances in metalloporphyrin-based catalyst design towards carbon dioxide reduction: from bio-inspired second coordination sphere modifications to hierarchical architectures

... offered by the urea groups. More detailed study based on observations from X-ray crystal structures of the catalysts and DFT calculations have revealed that indeed both N-H fragments of each urea arm ... Voir le document complet

16

Show all 10000 documents...