Showing 1 - 10 of 796
still possible for an adversary to reconstruct the original data using additional information thus resulting in privacy …, based on statistical decision theory, that assesses the relationship between the disclosed data and the resulting privacy … database. We assess the privacy risk by taking into account both the entity identification and the sensitivity of the disclosed …
Persistent link: https://www.econbiz.de/10009430800
towards the design of a generic framework to integrate these privacy preserving mechanisms at different layers of IoT …Data privacy is now-a-days a special issue in era of Internet of Things because of the big data stored and transmitted … by the public/private devices. Different types and levels of privacy can be provided at different layers of IoT …
Persistent link: https://www.econbiz.de/10012045715
RFID authentication protocols based on symmetric key cryptography. We identify the security and privacy requirements for an … healthcare applications to e-passport. The expansion of RFID technology, however, gives rise to severe security and privacy … concerns. To ensure the widespread deployment of this technology, the security and privacy threats must be addressed. However …
Persistent link: https://www.econbiz.de/10009484555
Persistent link: https://www.econbiz.de/10012520006
design. To this end, the basic security and privacy requirements that should be considered are introduced. Additionally, a … realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The … aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and …
Persistent link: https://www.econbiz.de/10012048083
constraints that affect the implementation of e‐government at each stage. Design/methodology/approach – Building on and expanding … user feasibility. The paper then provides an example of implementation of the framework by exploring the issue of privacy … complexities. Privacy in e‐government issues differs significantly when global motivators and constraints are viewed across the …
Persistent link: https://www.econbiz.de/10014687638
Purpose – The purpose of this paper is to examine trends towards “user centricity” in web‐based digital identity … technologies, and analyse these technologies in light of universal principles of human‐centred design and usability in order to … recommend future directions. Design/methodology/approach – Web users' habits and relevant usability research are analysed and …
Persistent link: https://www.econbiz.de/10014965909
, Legal Implications, Privacy and Identity Management, Deepfakes and Synthetic Identities, and Identity Fragmentation and …This paper explores the core principles that should guide the construction and governance of identity in the metaverse …, we propose two core principles for metaverse identity: Equivalence and Alignment, and Fusion and Expansiveness. The first …
Persistent link: https://www.econbiz.de/10015057346
privacy and security, suffer from one or more anomalies, and hence the problem of securing LBS data is far from being resolved …. In particular, accuracy of results vs. privacy degree, privacy vs. performance, and trust between users are open problems … superiority of our approach over earlier ones dealing with both the ratio of privacy and that of performance. …
Persistent link: https://www.econbiz.de/10012042666
healthcare organisations. But hosting healthcare solutions on cloud is challenging in terms of security and privacy of health … data. To address these challenges and to provide security and privacy to health data on the cloud, the authors present a … Software-as-a-Service (SaaS) application with a data model with built-in security and privacy. This data model enhances …
Persistent link: https://www.econbiz.de/10012043357