Now showing items 1-20 of 77

    • A la seguridad por la privacidad 

      Barceló Garcia, Miquel (2001-07)
      Article
      Open Access
    • A mobile Scenario for Electronic Publishing based on the MIPAMS Architecture 

      Delgado Mercè, Jaime; Llorente Viejo, Silvia; Rodríguez Luna, Eva; Torres Padrosa, Víctor (2011)
      Conference report
      Open Access
      This paper describes several scenarios for the management of digital media, focusing on electronic publishing from mobile environments. The solution proposed in those scenarios is based on MIPAMS (Multimedia Information ...
    • A privacy-preserving fuzzy interest matching protocol for friends finding in social networks 

      Wang, Xu An; Xhafa Xhafa, Fatos; Luo, Xiaoshuang; Zhang, Shuaiwei; Ding, Yong (Springer, 2017-02-07)
      Article
      Open Access
      Nowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ...
    • A survey on web tracking: mechanisms, implications, and defenses 

      Bujlow, Tomasz; Carela Español, Valentín; Solé Pareta, Josep; Barlet Ros, Pere (2017-08-01)
      Article
      Open Access
      Privacy seems to be the Achilles' heel of today's web. Most web services make continuous efforts to track their users and to obtain as much personal information as they can from the things they search, the sites they visit, ...
    • An efficient PHR service system supporting fuzzy keyword search and fine-grained access control 

      Xhafa Xhafa, Fatos; Wang, Jianfeng; Chen, Xiaofeng; Liu, Joseph K.; Li, Jin; Krause, Paul (Springer, 2014-09)
      Article
      Open Access
      Outsourcing of personal health record (PHR) has attracted considerable interest recently. It can not only bring much convenience to patients, it also allows efficient sharing of medical information among researchers. As ...
    • Analysis and evaluation of security developments in electronic payment methods 

      Mendieta Zurita, Joshua Ivan (Universitat Politècnica de Catalunya, 2019-09-06)
      Master thesis
      Open Access
      This master thesis with the name "Analysis and Evaluation of Security Developments in Electronic Payment Methods," aims to make a compendium of the technologies and standards used on today's payment card transactions since ...
    • Analysis of the univariate microaggregation disclosure risk 

      Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2009-08-07)
      Article
      Restricted access - publisher's policy
      Microaggregation is a protection method used by statistical agencies to limit the disclosure risk of confidential information. Formally, microaggregation assigns each original datum to a small cluster and then replaces ...
    • Análisis e implantación de medidas de Seguridad para el Cumplimiento de la Ley Orgánica de Protección de Datos 15/1999 y su Real Decreto 1720/2007 

      Cardona Alvarez, Jordi (Universitat Politècnica de Catalunya, 2015-10-30)
      Master thesis (pre-Bologna period)
      Restricted access - confidentiality agreement
      Covenantee:   Ernst & Young
    • Anonymizing data via polynomial regression 

      Nin Guerrero, Jordi; Pont Tuset, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (2007)
      Conference report
      Open Access
      The amount of confidential information accessible through the Internet is growing continuously. In this scenario, the improvement of anonymizing methods becomes crucial to avoid revealing sensible information of individuals. ...
    • Apple y el FBI 

      Barceló Garcia, Miquel (2016-05)
      Article
      Open Access
    • Approaching the rights management interoperability problem using intelligent brokerage mechanisms 

      Serrão, Carlos; Rodríguez Luna, Eva; Delgado Mercè, Jaime (2011-02-15)
      Article
      Restricted access - publisher's policy
      The digital content industry is facing significant challenges. One of the most significant challenges is the Intellectual Property protection. This challenge has been addressed technologically by using Digital Rights ...
    • Attacking pairing-free attribute-based encryption schemes 

      Herranz Sotoca, Javier (Institute of Electrical and Electronics Engineers (IEEE), 2020)
      Article
      Open Access
      Combining several results that have been published in the last years, it is known that it is impossible to design simple and secure attribute-based encryption schemes that work in (classical) settings like the RSA or the ...
    • Attribute selection in multivariate microaggregation 

      Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008)
      Conference report
      Restricted access - publisher's policy
      Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of the cluster. When the number of attributes ...
    • Authorization schema for electronic health-care records: for Uganda 

      Martínez Fernández, Alexis (Universitat Politècnica de Catalunya / KTH Royal Institute of Technology, 2012-08-23)
      Master thesis
      Open Access
      Covenantee:   Kungliga Tekniska högskolan
      This thesis discusses how to design an authorization schema focused on ensuring each patient's data privacy within a hospital information system.
    • Beyond multivariate microaggregation for large record anonymization 

      Nin Guerrero, Jordi (2014)
      Article
      Open Access
      Microaggregation is one of the most commonly employed microdata protection methods. The basic idea of microaggregation is to anonymize data by aggregating original records into small groups of at least k elements and, ...
    • Block coordinate descent decomposition for statistical data protection using controlled tabular adjustment 

      González Alastrué, José Antonio; Castro Pérez, Jordi (2009-10)
      External research report
      Restricted access - confidentiality agreement
      Tabular data is routinely released by national statistical agencies (NSA) to disseminate aggregated information from some particular microdata. Prior to publication, these tables have to be treated to preserve information ...
    • Blocking anonymized data 

      Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2007)
      Conference report
      Open Access
      Nowadays, privacy is an important issue, for this reason many researchers are working in the development of new data protection methods. The aim of these methods is to minimize the disclosure risk (DR) preserving the data ...
    • La Calidad de los Datos Personales en el Ámbito Médico-Sanitario 

      Kress Sevilla, Alejandro (Universitat Politècnica de Catalunya, 2012-02)
      Master thesis
      Restricted access - author's decision
      Este trabajo es un análisis del Estado del Arte sobre la protección de los datos de salud, incluido el sector biotecnológico. Esta materia tiene una creciente importancia debido a las normas aprobadas en España y la UE ...
    • Contributions to record linkage for disclosure risk assessment 

      Nin Guerrero, Jordi (Consejo Superior de Investigaciones Científicas (CSIC), 2009-10-15)
      Book
      Restricted access - publisher's policy
      This book is about reidentification methods, and, more especifically, about record linkage. This study is motivated on the need to assess in an accurate way the risk of disclosure within the fields of privacy preserving ...