|
|
|
Jane Henriksen-Bulmer, Shamal Faily and Sheridan Jeary
Cyber Physical Systems (CPS) seamlessly integrate physical objects with technology, thereby blurring the boundaries between the physical and virtual environments. While this brings many opportunities for progress, it also adds a new layer of complexity t...
ver más
|
|
|
|
|
|
|
Ricardo Martins Gonçalves, Miguel Mira da Silva and Paulo Rupino da Cunha
The immutability of data stored in a blockchain is a crucial pillar of trust in this technology, which has led to its increasing adoption in various use cases. However, there are situations where the inability to change or delete data may be illegal. Eur...
ver más
|
|
|
|
|
|
|
Lili Jiang and Vicenç Torra
Anonymization and data masking have effects on data-driven models. Different anonymization methods have been developed to provide a good trade-off between privacy guarantees and data utility. Nevertheless, the effects of data protection (e.g., data micro...
ver más
|
|
|
|
|
|
|
Xinyu Liu, Shan Ji, Xiaowan Wang, Liang Liu and Yongjun Ren
Blockchain, with its characteristics of non-tamperability and decentralization, has had a profound impact on various fields of society and has set off a boom in the research and application of blockchain technology. However, blockchain technology faces t...
ver más
|
|
|
|
|
|
|
Harshvardhan J. Pandit
Solid is a new radical paradigm based on decentralising control of data from central organisations to individuals that seeks to empower individuals to have active control of who and how their data is being used. In order to realise this vision, the use-c...
ver más
|
|
|
|
|
|
|
Christian Esposito, Ross Horne, Livio Robaldo, Bart Buelens and Elfi Goesaert
The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, se...
ver más
|
|
|
|
|
|
|
Yongbo Jiang, Gongxue Sun and Tao Feng
With the increasing value of various kinds of data in the era of big data, the demand of different subjects for data transactions has become more and more urgent. In this paper, a blockchain-based data transaction protection scheme is proposed to realize...
ver más
|
|
|
|
|
|
|
Dimitrios Papamartzivanos, Sofia Anna Menesidou, Panagiotis Gouvas and Thanassis Giannetsos
As the upsurge of information and communication technologies has become the foundation of all modern application domains, fueled by the unprecedented amount of data being processed and exchanged, besides security concerns, there are also pressing privacy...
ver más
|
|
|
|
|
|
|
Sâmmara Éllen Renner Ferrão, Artur Potiguara Carvalho, Edna Dias Canedo, Alana Paula Barbosa Mota, Pedro Henrique Teixeira Costa and Anderson Jefferson Cerqueira
In order to guarantee the privacy of users? data, the Brazilian government created the Brazilian General Data Protection Law (LGPD). This article made a diagnostic of Brazilian organizations in relation to their suitability for LGPD, based on the percept...
ver más
|
|
|
|
|
|
|
Hugo Lopes, Ivan Miguel Pires, Hector Sánchez San Blas, Raúl García-Ovejero and Valderi Leithardt
The mobile devices cause a constant struggle for the pursuit of data privacy. Nowadays, it appears that the number of mobile devices in the world is increasing. With this increase and technological evolution, thousands of data associated with everyone ar...
ver más
|
|
|
|
|
|
|
Elena Kuleshova, Anatoly Marukhlenko, Vyacheslav Dobritsa and Maxim Tanygin
Currently, the following applications of the theory of cellular automata are known: symmetric encryption, data compression, digital image processing and some others. There are also studies suggesting the possibility of building a public key system based ...
ver más
|
|
|
|
|
|
|
Trung Duy Pham,Dat Tran,Wanli Ma
In the biomedical and healthcare fields, the ownership protection of the outsourced data is becoming a challenging issue in sharing the data between data owners and data mining experts to extract hidden knowledge and patterns. Watermarking has been prove...
ver más
|
|
|
|
|
|
|
Teresa Scassa
The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. ...
ver más
|
|
|
|
|
|
|
Yuh-Jong Hu, Win-Nan Wu, Kua-Ping Cheng and Ya-Ling Huang
In semantic policy infrastructure, a Trusted Legal Domain (TLD), designated as a Super-Peer Domain (SPD), is a legal cage model used to circumscribe the legal virtual boundary of data disclosure and usage in the cloud. Semantic legal policies in complian...
ver más
|
|
|
|
|
|
|
Dimitra Georgiou and Costas Lambrinoudakis
The General Data Protection Regulation (GDPR) harmonizes personal data protection laws across the European Union, affecting all sectors including the healthcare industry. For processing operations that pose a high risk for data subjects, a Data Protectio...
ver más
|
|
|
|
|
|
|
Pankaj Khatiwada, Bian Yang, Jia-Chun Lin, Godfrey Mugurusi and Stian Underbekken
Internet of Things (IoT) devices have changed how billions of people in the world connect and interact with each other. But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask fo...
ver más
|
|
|
|
|
|
|
Tim Friedhoff, Cam-Duc Au, Nadine Ladnar, Dirk Stein and Alexander Zureck
According to a study by the German Federal Printing Office (2022), every European lives with 90 digital identities on average, and the trend is rising. The German government has launched the innovation competition ?Digital Identities Showcase? to select ...
ver más
|
|
|
|
|
|
|
Dmitry Vesnin, Dmitry Levshun and Andrey Chechulin
The origin of the trademark similarity analysis problem lies within the legal area, specifically the protection of intellectual property. One of the possible technical solutions for this issue is the trademark similarity evaluation pipeline based on the ...
ver más
|
|
|
|
|
|
|
Alex Sendrós, Mahjoub Himi, Lluís Rivero, Raúl Lovera, Aritz Urruela, Josefina C. Tapias and Albert Casas
The basis for the protection and prevention of groundwater pollution lies in the accurate assessment of vulnerability in terms of the exposure of groundwater bodies to contaminants before they are potentially discharged into the environment. The vulnerab...
ver más
|
|
|
|
|
|
|
Yinguo Qiu, Jiuyun Sun and Jiaojue Zheng
The existing digital watermarking schemes for vector maps focus mainly on the process of watermark embedding, while few works have been conducted on the topic of the self-optimization of watermark data in the process of watermark detection. There is thus...
ver más
|
|
|
|