Now showing items 1-20 of 63

  • A la seguridad por la privacidad 

    Barceló Garcia, Miquel (2001-07)
    Article
    Open Access
  • Análisis e implantación de medidas de Seguridad para el Cumplimiento de la Ley Orgánica de Protección de Datos 15/1999 y su Real Decreto 1720/2007 

    Cardona Alvarez, Jordi (Universitat Politècnica de Catalunya, 2015-10-30)
    Master thesis (pre-Bologna period)
    Restricted access - confidentiality agreement
    Covenantee:  Ernst & Young
  • Analysis of the univariate microaggregation disclosure risk 

    Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2009-08-07)
    Article
    Restricted access - publisher's policy
    Microaggregation is a protection method used by statistical agencies to limit the disclosure risk of confidential information. Formally, microaggregation assigns each original datum to a small cluster and then replaces ...
  • An efficient PHR service system supporting fuzzy keyword search and fine-grained access control 

    Xhafa Xhafa, Fatos; Wang, Jianfeng; Chen, Xiaofeng; Liu, Joseph K.; Li, Jin; Krause, Paul (Springer, 2014-09)
    Article
    Open Access
    Outsourcing of personal health record (PHR) has attracted considerable interest recently. It can not only bring much convenience to patients, it also allows efficient sharing of medical information among researchers. As ...
  • Anonymizing data via polynomial regression 

    Nin Guerrero, Jordi; Pont Tuset, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (2007)
    Conference report
    Open Access
    The amount of confidential information accessible through the Internet is growing continuously. In this scenario, the improvement of anonymizing methods becomes crucial to avoid revealing sensible information of individuals. ...
  • Aplicación del método de Benders para ajuste controlado de tablas (CTA) 

    Baena Mirabete, Daniel (Universitat Politècnica de Catalunya, 2008-02)
    Master thesis
    Open Access
    La presente memoria tiene como objeto de estudio el desarrollo de un método óptimo (Descomposición de Benders) para CTA como MILP que mejore la calidad de los resultados. La memoria está dividida en 3 bloques. En un ...
  • Approaching the rights management interoperability problem using intelligent brokerage mechanisms 

    Serrão, Carlos; Rodríguez Luna, Eva; Delgado Mercè, Jaime (2011-02-15)
    Article
    Restricted access - publisher's policy
    The digital content industry is facing significant challenges. One of the most significant challenges is the Intellectual Property protection. This challenge has been addressed technologically by using Digital Rights ...
  • A privacy-preserving fuzzy interest matching protocol for friends finding in social networks 

    Wang, Xu An; Xhafa Xhafa, Fatos; Luo, Xiaoshuang; Zhang, Shuaiwei; Ding, Yong (Springer, 2017-02-07)
    Article
    Open Access
    Nowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ...
  • A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings 

    Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (2012)
    Article
    Restricted access - publisher's policy
    Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ...
  • A survey on web tracking: mechanisms, implications, and defenses 

    Bujlow, Tomasz; Carela Español, Valentín; Solé Pareta, Josep; Barlet Ros, Pere (2017-08-01)
    Article
    Open Access
    Privacy seems to be the Achilles' heel of today's web. Most web services make continuous efforts to track their users and to obtain as much personal information as they can from the things they search, the sites they visit, ...
  • Attribute selection in multivariate microaggregation 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008)
    Conference report
    Restricted access - publisher's policy
    Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of the cluster. When the number of attributes ...
  • Authorization schema for electronic health-care records: for Uganda 

    Martínez Fernández, Alexis (Universitat Politècnica de Catalunya / KTH Royal Institute of Technology, 2012-08-23)
    Master thesis
    Open Access
    Covenantee:  Kungliga Tekniska högskolan
    This thesis discusses how to design an authorization schema focused on ensuring each patient's data privacy within a hospital information system.
  • Beyond multivariate microaggregation for large record anonymization 

    Nin Guerrero, Jordi (2014)
    Article
    Open Access
    Microaggregation is one of the most commonly employed microdata protection methods. The basic idea of microaggregation is to anonymize data by aggregating original records into small groups of at least k elements and, ...
  • Block coordinate descent decomposition for statistical data protection using controlled tabular adjustment 

    González Alastrué, José Antonio; Castro Pérez, Jordi (2009-10)
    External research report
    Restricted access - confidentiality agreement
    Tabular data is routinely released by national statistical agencies (NSA) to disseminate aggregated information from some particular microdata. Prior to publication, these tables have to be treated to preserve information ...
  • Blocking anonymized data 

    Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2007)
    Conference report
    Open Access
    Nowadays, privacy is an important issue, for this reason many researchers are working in the development of new data protection methods. The aim of these methods is to minimize the disclosure risk (DR) preserving the data ...
  • La Calidad de los Datos Personales en el Ámbito Médico-Sanitario 

    Kress Sevilla, Alejandro (Universitat Politècnica de Catalunya, 2012-02)
    Master thesis
    Restricted access - author's decision
    Este trabajo es un análisis del Estado del Arte sobre la protección de los datos de salud, incluido el sector biotecnológico. Esta materia tiene una creciente importancia debido a las normas aprobadas en España y la UE ...
  • Contributions to record linkage for disclosure risk assessment 

    Nin Guerrero, Jordi (Consejo Superior de Investigaciones Científicas (CSIC), 2009-10-15)
    Book
    Restricted access - publisher's policy
    This book is about reidentification methods, and, more especifically, about record linkage. This study is motivated on the need to assess in an accurate way the risk of disclosure within the fields of privacy preserving ...
  • Demand-side management via distributed energy generation and storage optimization 

    Atzeni, Italo; García Ordoñez, Luis; Scutari, Gesualdo; Palomar, Daniel P.; Rodríguez Fonollosa, Javier (Institute of Electrical and Electronics Engineers (IEEE), 2013-06)
    Article
    Restricted access - publisher's policy
    Demand-side management, together with the integration of distributed energy generation and storage, are considered increasingly essential elements for implementing the smart grid concept and balancing massive energy ...
  • Design and implementation of routing protocols with anonymity for vehicular ad-hoc networks in urban environments 

    Urquiza Aguiar, Luis Felipe (Universitat Politècnica de Catalunya, 2012-07-20)
    Master thesis
    Open Access
    [ANGLÈS] There are unlimited opportunities for civilian car to car application for VANETs. The priority research field for Car Manufacturers as well as Governmental Transportation Authorities is the safe navigation. ...
  • Detecting network performance anomalies with contextual anomaly detection 

    Dimopoulos, Giorgos; Barlet Ros, Pere; Dovrolis, Constantine; Leontiadis, Ilias (Institute of Electrical and Electronics Engineers (IEEE), 2017)
    Conference report
    Open Access
    Network performance anomalies can be defined as abnormal and significant variations in a network's traffic levels. Being able to detect anomalies is critical for both network operators and end users. However, the accurate ...