Security and Privacy
3,227 Followers
Recent papers in Security and Privacy
Conferência ao IV Congresso Interativo Virtual "Humanos Direitos Máquinas - amigos ou inimigos". Universidad Nacional de Lanús / E-Justicia Latinoamérica, Argentina. Dia 20 de novembro de 2019. A mesma retoma a comunicação apresentada na... more
With the pace of increasing online transactions and communication, the demand for security and privacy increases. To protect confidential information and to authenticate people electronically, several solutions already introduced.... more
This paper summarizes the ideas and results of three working groups that convened during the 1st International Conference on Security in Pervasive Computing. The scope of the workshop was to identify and discuss security and privacy... more
This essay aims to address a general conception of what privacy is, as well as an analysis of the challenges and dangers of living without privacy and the importance of data protection against the breakdown of traditional paradigms by new... more
Radio-Frequency Identification (RFID) is going to be the preferred technology for the realization of Machine Readable Travel Documents (MRTDs), and has been deployed in the last generation of e-passports. The proposed technical... more
... for FISMA (Federal Information Security Management Act) compliance for its Cloud-Computing services in order to be acceptable for the public sector[17]. ... 17. Howard, AB, FISMA compliance for federal cloud computing on the horizon... more
Este livro é destinado a estudantes, pesquisadores, profissionais e demais interessados em comércio eletrônico (e-commerce), e faz um resgate histórico do surgimento das compras on-line, sua evolução no decorrer dos anos, além de explanar... more
Anomaly detection in a wireless sensor network (WSN) is an important aspect of data analysis in order to identify data items that significantly differ from normal data. A characteristic of the data generated by a WSN is that the data... more
Despite years of heavy criticism, privacy self-management (i.e., the principle that people individually manage their privacy via notice and choice) remains the standard of privacy protection throughout the Western world. Building on... more
Current mechanisms for authenticating communication between devices that share no prior context are inconvenient for ordinary users, without the assistance of a trusted authority. We present and analyze Seeing-Is-Believing, a system that... more
Public opinion is the belief or thought of a group of people regarding a particular topic, especially on politics, religion, social issues, demographic diversity, etc. The opinion of the individual may be sensitive since it reflects the... more
Intrusion detection system (IDS) is essential for the network; the intruder can steal sensitive information about networks. The IDS must have the ability to take care of large and real-time data. The predicted rate must be high based on... more
Medical cyber-physical systems (MCPS) are lifecritical, context-aware, networked systems of medical devices. These systems are increasingly used in hospitals to provide highquality continuous care for patients. The need to design complex... more
Abstract: - Radio Frequency Identification (RFID) technology is emerging as an important tool with applications in a variety of fields. The major concern regarding RFID is the ubiquitous nature of its deployment that extends far beyond... more
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes... more
Internet Privacy and Myths Third Edition 2016
Within the next year, travelers from dozens of nations may be carrying a new form of passport in response to a mandate by the United States government. The e-passport, as it is sometimes called, represents a bold initiative in the... more
Cloud computing is one of the fastest emerging technologies; it gains wide acceptance from various Business organizations & Information Technology (IT) Industries. Cloud computing provides various services to users through the internet;... more
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and... more
Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for the IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture,... more
In recent years, deceptive content such as fake news and fake reviews, also known as opinion spams, have increasingly become a dangerous prospect for online users. Fake reviews have affected consumers and stores alike. Furthermore, the... more
Cloud consumers are hesitant in choosing an appropriate cloud service as they are under the assumption that clouds are not safe for their data and operations. This is due to the presence of a trust gap between cloud service consumers and... more
Palestra / Conferência na Oficina "Lei Geral de Proteção de Dados (LGPD)", integrada no Congresso 'Universitas' e Direito da Escola de Direito da Pontifícia Universidade Católica do Paraná, Curitiba. Dia 10 de novembro 2020.
Privacy is currently at the centre of a fierce battle. On one side, powerful data companies like Google, Facebook, and major data brokers are collecting and analysing as much personal data as they can. They are lobbying governments around... more
... For example, tourists need indoor navigation services in some large museums to see the artifacts in different places in sequence. In addition, posi-tion information brings benefits to self-organization and self-formation of ad hoc... more
Primeira Palestra / Conferência de duas sobre "A Anonimização, Pseudonimização e Cifragem: alguns apontamentos comparativos entre o RGPD e a LGPD", para a Comissão de Direito Digital da Subseção de Campinas da Ordem dos Advogados do... more
"In The Crowdsourced Panopticon: Conformity and Control on Social Media, Jeremy Weissman explores the role of ‘peer-to-peer’ surveillance through social media and how this is increasingly shaping our behaviour. This is a welcome addition... more
Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, we... more
Topics of interest include but are not limited to: Social media/networks literacy (e.g., critical thinking, scams, phishing) Social media/networks users (e.g., QOL, FOMO, addiction, cyberbullying, trolling, social distancing,... more
This paper aims to review and evaluate the vision, the objectives and the strategic framework of e-Government in Singapore. Rapidity, Reliability, Efficiency, Cost-effectiveness, Customer-orientation and Accessibility are the main... more
Angeles (UCLA). Thank you to the dedicated Federal Communications Law Journal staff for bringing this Note to publication. Special thanks to Meredith Rose, Journal Adjunct, and Atena Sheibani-Nejad, Notes Editor, for their patience and... more
Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, a major barrier for cloud adoption is real and perceived lack of security. In this paper, we take a... more
Il trattamento dei cd. Big Data, per conformarsi al Regolamento europeo sulla protezione dei dati personali, richiede un'indagine preliminare volta a individuare quali siano le misure organizzative e tecniche idonee alla corretta... more
Internet banking is a form of self service technology. The numbers of Internet users have increased dramatically, but most of them are reluctant to provide sensitive personal information to websites because they do not trust e-commerce... more
2007 was the year of online gaming fraud-with malicious programs that specifically target online games and virtual worlds increasing by 145% and the emergence of over 30,000 new programs aimed at stealing online game passwords. Such... more
Note: my article is at page 15. I was quoted in the Conversation at http://theconversation.com/snowden-report-calls-out-australias-inadequate-privacy-law-27856
Conferência proferida na Escola Superior de Enfermagem do Porto, no dia 2 de maio de 2016..
Wireless sensor networks (WSNs) have attracted a lot of interest over the last decade in wireless and mobile computing research community. Applications of WSNs are numerous and growing, which range from indoor deployment scenarios in the... more