Exploració per tema "Data protection"
Ara es mostren els items 1-20 de 102
-
A construction of traceability set systems with polynomial tracing algorithm
(Institute of Electrical and Electronics Engineers (IEEE), 2019)
Text en actes de congrés
Accés obertA family F of w-subsets of a finite set X is called a set system with the identifiable parent property if for any w-subset contained in the union of some t sets, called traitors, of F at least one of these sets can be ... -
A la seguridad por la privacidad
(2001-07)
Article
Accés obert -
A multimetric predictive ANN-based routing protocol for vehicular ad hoc networks
(Institute of Electrical and Electronics Engineers (IEEE), 2021-06-11)
Article
Accés obertVehicular networks support intelligent transportation system (ITS) to improve drivers’ safety and traffic efficiency on the road by exchanging traffic-related information between vehicles and also between vehicles and ... -
A privacy-preserving fuzzy interest matching protocol for friends finding in social networks
(Springer, 2017-02-07)
Article
Accés obertNowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ... -
A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings
(2012)
Article
Accés restringit per política de l'editorialRecommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ... -
A survey of machine and deep learning methods for privacy protection in the Internet of things
(Multidisciplinary Digital Publishing Institute (MDPI), 2023-01-21)
Article
Accés obertRecent advances in hardware and information technology have accelerated the proliferation of smart and interconnected devices facilitating the rapid development of the Internet of Things (IoT). IoT applications and services ... -
A survey on web tracking: mechanisms, implications, and defenses
(2017-08-01)
Article
Accés obertPrivacy seems to be the Achilles' heel of today's web. Most web services make continuous efforts to track their users and to obtain as much personal information as they can from the things they search, the sites they visit, ... -
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control
(Springer, 2014-09)
Article
Accés obertOutsourcing of personal health record (PHR) has attracted considerable interest recently. It can not only bring much convenience to patients, it also allows efficient sharing of medical information among researchers. As ... -
Analysis and evaluation of security developments in electronic payment methods
(Universitat Politècnica de Catalunya, 2019-09-06)
Projecte Final de Màster Oficial
Accés obertThis master thesis with the name "Analysis and Evaluation of Security Developments in Electronic Payment Methods," aims to make a compendium of the technologies and standards used on today's payment card transactions since ... -
Analysis and improvement of security and privacy techniques for genomic information
(Universitat Politècnica de Catalunya, 2021-10-28)
Projecte Final de Màster Oficial
Accés obertThe purpose of this thesis is to review the current literature of privacy preserving techniques for genomic information on the last years. Based on the analysis, we propose a long-term classification system for the reviewed ... -
Analysis of the univariate microaggregation disclosure risk
(2009-08-07)
Article
Accés restringit per política de l'editorialMicroaggregation is a protection method used by statistical agencies to limit the disclosure risk of confidential information. Formally, microaggregation assigns each original datum to a small cluster and then replaces ... -
Análisis e implantación de medidas de Seguridad para el Cumplimiento de la Ley Orgánica de Protección de Datos 15/1999 y su Real Decreto 1720/2007
(Universitat Politècnica de Catalunya, 2015-10-30)
Projecte/Treball Final de Carrera
Accés restringit per acord de confidencialitat
Realitzat a/amb: Ernst & Young -
Anonymizing data via polynomial regression
(2007)
Text en actes de congrés
Accés obertThe amount of confidential information accessible through the Internet is growing continuously. In this scenario, the improvement of anonymizing methods becomes crucial to avoid revealing sensible information of individuals. ... -
Aplicación del método de Benders para ajuste controlado de tablas (CTA)
(Universitat Politècnica de Catalunya, 2008-02)
Projecte Final de Màster Oficial
Accés obertLa presente memoria tiene como objeto de estudio el desarrollo de un método óptimo (Descomposición de Benders) para CTA como MILP que mejore la calidad de los resultados. La memoria está dividida en 3 bloques. En un ... -
Approaching the rights management interoperability problem using intelligent brokerage mechanisms
(2011-02-15)
Article
Accés restringit per política de l'editorialThe digital content industry is facing significant challenges. One of the most significant challenges is the Intellectual Property protection. This challenge has been addressed technologically by using Digital Rights ... -
Attacking pairing-free attribute-based encryption schemes
(Institute of Electrical and Electronics Engineers (IEEE), 2020)
Article
Accés obertCombining several results that have been published in the last years, it is known that it is impossible to design simple and secure attribute-based encryption schemes that work in (classical) settings like the RSA or the ... -
Attribute selection in multivariate microaggregation
(2008)
Text en actes de congrés
Accés restringit per política de l'editorialMicroaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of the cluster. When the number of attributes ... -
Authorization schema for electronic health-care records: for Uganda
(Universitat Politècnica de Catalunya / KTH Royal Institute of Technology, 2012-08-23)
Projecte Final de Màster Oficial
Accés obert
Realitzat a/amb: Kungliga Tekniska högskolanThis thesis discusses how to design an authorization schema focused on ensuring each patient's data privacy within a hospital information system. -
Beyond multivariate microaggregation for large record anonymization
(2014)
Article
Accés obertMicroaggregation is one of the most commonly employed microdata protection methods. The basic idea of microaggregation is to anonymize data by aggregating original records into small groups of at least k elements and, ... -
Block coordinate descent decomposition for statistical data protection using controlled tabular adjustment
(2009-10)
Report de recerca
Accés restringit per acord de confidencialitatTabular data is routinely released by national statistical agencies (NSA) to disseminate aggregated information from some particular microdata. Prior to publication, these tables have to be treated to preserve information ...