Search results for "Pseudonym"

showing 8 items of 18 documents

MAGICPL: A Generic Process Description Language for Distributed Pseudonymization Scenarios

2021

Abstract Objectives Pseudonymization is an important aspect of projects dealing with sensitive patient data. Most projects build their own specialized, hard-coded, solutions. However, these overlap in many aspects of their functionality. As any re-implementation binds resources, we would like to propose a solution that facilitates and encourages the reuse of existing components. Methods We analyzed already-established data protection concepts to gain an insight into their common features and the ways in which their components were linked together. We found that we could represent these pseudonymization processes with a simple descriptive language, which we have called MAGICPL, plus a relati…

Service (systems architecture)Biomedical ResearchComputer scienceProcess (engineering)computer.internet_protocolHealth InformaticsReuse03 medical and health sciences0302 clinical medicineHealth Information ManagementComponent (UML)Humans030212 general & internal medicinePseudonymizationComputer SecurityLanguageAdvanced and Specialized NursingClass (computer programming)Application programming interfacebusiness.industry030220 oncology & carcinogenesisSoftware engineeringbusinesscomputerConfidentialitySoftwareXMLMethods of Information in Medicine
researchProduct

I nomi dietro i numeri: Michele Salvemini aka Caparezza

2019

The present work focusses on the onomastic interest shown by a singer belonging to the new generation of Italian rappers, Michele Salvemini, aka Caparezza. His expressive talent managed to shape an anti-purist language, full of styles and registers, open to dialect and spoken language, which ranges from the younger generations’ language to neologisms, from English to special languages, from jargon to Latin. The pattern of his CDs, a sort of “fononovels”, modernises the structure of the concept-album of the ‘70s on the basis of constant references to contemporary Italian events, news and characters, and of his figure as an artist. Caparezza’s choices shows a linguistic awareness which goes b…

Settore L-FIL-LET/12 - Linguistica ItalianaCaparezza pseudonimi musica rap corrispondenze numeriche onomastica analisi testualeCaparezza pseudonyms music rap numerical correspondence
researchProduct

Cyber-Identities and Social Life in Cyberspace

2011

Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cybertrends. Similar to the ways that previous social and mass media dissolved social boundaries related to time and space, cyber-communities and social software seem to also dissolve the boundaries of identity. This, in turn, questions the trust, privacy and confidentiality of interaction. The authors present a way of classifying and viewing self-pr…

Social lifebusiness.industryInternet privacySociologyComputer securitycomputer.software_genrebusinessCyberspacecomputerPseudonymityAnonymity
researchProduct

Psevdonimy Soloveckich literatorov: voprosy istoričeskoj i tvorčeskoj biografii

2019

The articles analyses the uses of pseudonyms in the press of the Solovki prison camp

Solovki prison camp Gulag Pseudonyms Autobiography
researchProduct

VLPZ: The Vehicular Location Privacy Zone

2016

International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…

StandardizationComputer scienceWireless ad hoc networkSecurity.02 engineering and technologyPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringVANETsGeneral Environmental ScienceLocation privacybiologybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020302 automobile design & engineering020206 networking & telecommunicationsPseudonym ChangingTollMetric (mathematics)biology.proteinKey (cryptography)SecurityGeneral Earth and Planetary SciencesComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputerAnonymityComputer network
researchProduct

PRIVANET: An Efficient Pseudonym Changing and Management Framework for Vehicular Ad-Hoc Networks

2020

Protecting the location privacy is one of the main challenges in vehicular ad-hoc networks (VANETs). Although, standardization bodies, such as IEEE and ETSI, have adopted a pseudonym-based scheme as a solution for this problem, an efficient pseudonym changing and management is still an open issue. In this paper, we propose PRIVANET, a complete and efficient pseudonym changing and management framework. The PRIVANET has a hierarchical structure and considers the vehicular geographic area as a grid. Each cell of this grid contains one or many logical zones, called vehicular location privacy zones (VLPZs). These zones can easily be deployed over the widespread roadside infrastructures (RIs), su…

Structure (mathematical logic)Scheme (programming language)050210 logistics & transportationStandardizationComputer scienceStochastic modellingbusiness.industryWireless ad hoc networkMechanical Engineeringmedia_common.quotation_subjectComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesPseudonymGridComputer Science Applications0502 economics and businessAutomotive EngineeringbusinesscomputerComputer networkReputationmedia_commoncomputer.programming_languageIEEE Transactions on Intelligent Transportation Systems
researchProduct

English, French, and Polish Aliases of Criminals: Diversity of Inspirations in their Creation and Typical Nicknaming Schemes

2021

The present paper examines the topic of aliases of criminals, which seems to be understudied in linguistic research. Therefore, this article’s primary goal is to describe how criminals’ aliases are created and what are the differences and similarities in that process in English, French, and Polish. Firstly, the theoretical background concerning the topic of pseudonyms is presented. Then, the corpus gathered for this paper (available online: https://cutt.ly/1TRefrK), consisting of 206 pseudonyms (123 units in English, 42 in French, and 41 in Polish), is analyzed. In the analysis, four schemes are noted to be the most commonly used in creating pseudonyms of criminals. What ismore, the inspira…

aliasnicknamepseudonymserial killersonomasticscriminalsAcademic Journal of Modern Philology
researchProduct

Anonymiteetin haasteet Bitcoinin käytössä

2019

Tutkielman tavoitteena on selvittää, tarjoaako viimeisen vuosikymmenen aika- na suosioon noussut kryptovaluutta Bitcoin käyttäjilleen anonymiteettiä. Kryptovaluuttojen anonymiteetin tarkasteluun eivät perinteiseen tiedonsiirtoon liitetyt anonymiteetin teoreemat täysin sovellu ja tästä johtuen on muodostettu kryptovaluuttoja koskeva uusi anonymiteetin määritelmä. Tämän uuden määritelmän mukaisesti anonymiteettia tarkastellessa on selvää, että Bitcoin ei oletusarvoisesti tarjoa käyttäjilleen anonymiteettia. Myös vaihtoehtoisia kryptovaluuttoja on Bitcoinin suosion myötä luotu ja useita Bitcoinin sisällä toimivia palveluja on kehitetty anonymiteettiä silmällä pitäen. Tutkielmassa tarkastellaan…

virtuaalivaluuttabitcoinpseudonymiteettianonymiteetti
researchProduct