Search results for " Soft"

showing 10 items of 1710 documents

Security and privacy in the cloud a long-term view

2011

In this paper we analyze security and privacy aspects of the cloud. We take a long-term view since the scope of privacy is potentially the lifetime of the privacy subject. We investigate trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. We also present promising solution for credible privacy in a cloud environment.

Information privacyCloud computing securityScope (project management)Privacy by DesignComputer sciencebusiness.industryPrivacy softwareData_MISCELLANEOUSInternet privacyCloud computingComputer securitycomputer.software_genreTerm (time)ComputingMilieux_COMPUTERSANDSOCIETYSubjective logicbusinesscomputer2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
researchProduct

Technical Briefing: Hands-On Session on the Development of Trustworthy AI Software

2021

Following various real-world incidents involving both purely digital and cyber-physical Artificial Intelligence (AI) systems, AI Ethics has become a prominent topic of discussion in both research and practice, accompanied by various calls for trustworthy AI systems. Failures are often costly, and many of them stem from issues that could have been avoided during development. For example, AI ethics issues, such as data privacy are currently highly topical. However, implementing AI ethics in practice remains a challenge for organizations. Various guidelines have been published to aid companies in doing so, but these have not seen widespread adoption and may feel impractical. In this technical …

Information privacyComputer sciencebusiness.industryCyber-physical systemTrusted ComputingSoftware maintenanceSoftware prototypingGeneralLiterature_MISCELLANEOUSSession (web analytics)Engineering managementComputingMethodologies_PATTERNRECOGNITIONbusinessDesign methodsAgile software development2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)
researchProduct

Privacy violations in Riga open data public transport system

2016

Over the recent years public transportation systems around the world have been migrating to digital ticketing solutions. This paper investigates security and privacy aspects of the one such system implemented by Riga municipality called e-talons by analysing published open data containing ride registrations.

Information privacyEngineeringPrivacy by Designbusiness.industryPrivacy softwareInternet privacyComputer securitycomputer.software_genreEncryptionOpen dataPublic transportAlgorithm designbusinesscomputer2016 IEEE 4th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

Privacy handling for critical information infrastructures

2013

This paper proposes an architecture and a methodology for privacy handling in Critical Information Infrastructures. Privacy is in this respect considered as both the risk of revealing person-sensitive information, for example from critical infrastructures in health institutions, but also to identify and avoid leakage of confidential information from the critical information infrastructures themselves. The architecture integrates privacy enhancing technologies into an enterprise service bus, which allows for policy-controlled authorisation, anonymisation and encryption of information in XML elements or attributes in messages on the service bus. The proposed methodology can be used to identif…

Information privacyPrivacy by DesignComputer sciencebusiness.industryPrivacy softwareComputer securitycomputer.software_genreEncryptionInformation sensitivityEnterprise service busPrivacy-enhancing technologiesbusinessResilience (network)computer2013 11th IEEE International Conference on Industrial Informatics (INDIN)
researchProduct

To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications

2007

User's privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model which tackles the problem from the perspective of trade-off between privacy and trust, where the user takes the decision with minimal privacy loss. To support the user decision, we introduce the Mobile Access Control List (Macl), a privacy management mechanism which takes into account the user attitude towards mobile sharing, his communication history and social network relationships.

Information privacySocial networkPrivacy by Designbusiness.industryPrivacy softwareComputer scienceInternet privacySocial softwareMobile computingConceptual model (computer science)computer.software_genreWorld Wide WebbusinesscomputerAccess control list
researchProduct

Internet of things and privacy preserving technologies

2009

In this paper we consider different approaches to technological protection of users' privacy in the world of internet of things. Particularly, we consider what kind of problems and which level of protection can be achieved by applying approaches using secure multi-party computations.

Information privacyUbiquitous computingPrivacy by Designbusiness.industryComputer sciencePrivacy softwareInternet privacyData securityCryptographyComputer securitycomputer.software_genreWeb of ThingsThe Internetbusinesscomputer2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Rings for privacy: An architecture for privacy-preserving user profiling

2014

Information privacysocial networking (online) data privacy human factors InternetSettore ING-INF/03 - TelecomunicazioniComputer sciencePrivacy softwarebusiness.industryInternet privacyComputer securitycomputer.software_genrePrivacy preservingprivacy-preserving users profiling FCM clustering distributed unstable scenarioProfiling (information science)The InternetArchitecturebusinesscomputer
researchProduct

Separating compound figures in journal articles to allow for subfigure classification

2013

Journal images represent an important part of the knowledge stored in the medical literature. Figure classification has received much attention as the information of the image types can be used in a variety of contexts to focus image search and filter out unwanted information or ”noise”, for example non–clinical images. A major problem in figure classification is the fact that many figures in the biomedical literature are compound figures and do often contain more than a single figure type. Some journals do separate compound figures into several parts but many do not, thus requiring currently manual separation. In this work, a technique of compound figure separation is proposed and implemen…

Information retrieval020205 medical informaticsComputer scienceProcess (computing)020207 software engineering02 engineering and technologyFilter (signal processing)Image (mathematics)[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Noise (video)Focus (optics)ComputingMilieux_MISCELLANEOUS
researchProduct

Modeling and querying facts with period timestamps in data warehouses

2019

Abstract In this paper, we study various ways of representing and querying fact data that are time-stamped with a time period in a data warehouse. The main focus is on how to represent the time periods that are associated with the facts in order to support convenient and efficient aggregations over time. We propose three distinct logical models that represent time periods as sets of all time points in a period (instant model), as pairs of start and end time points of a period (period model), and as atomic units that are explicitly stored in a new period dimension (period∗ model). The period dimension is enriched with information about the days of each period, thereby combining the former tw…

Information retrievalComputer scienceApplied Mathematicsdata warehouse020207 software engineering02 engineering and technologylogical modelsQA75.5-76.95Data warehouse020204 information systemsElectronic computers. Computer science0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)QA1-939Timestamptime periodsEngineering (miscellaneous)Period (music)MathematicsInternational Journal of Applied Mathematics and Computer Science
researchProduct

On Keyword-Based Ad-Hoc Querying of Hospital Data Stored in Semistar Data Ontologies

2018

Abstract This paper sketches a possible solution to the problem of the currently growing necessity in various domains for domain experts to be able to query the database of the organization in a convenient manner. The paper focuses on the domain of hospital management where the normal practice is to involve a programmer as an intermediary between the managers and the database. This is an error-prone and cumbersome solution. The decision-making process of domain experts would hugely benefit if they could retrieve the information from the database themselves. There have been attempts to develop natural language-based query languages for this exact purpose, but the ultimate goal of the simplic…

Information retrievalComputer scienceProcess (engineering)media_common.quotation_subject020207 software engineering02 engineering and technologyOntology (information science)Query languageDomain (software engineering)0202 electrical engineering electronic engineering information engineeringGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingSimplicityProgrammerNatural languageGeneral Environmental Sciencemedia_commonProcedia Computer Science
researchProduct