Biometric recognition in automated border control: a survey

RD Labati, A Genovese, E Muñoz, V Piuri… - ACM Computing …, 2016 - dl.acm.org
The increasing demand for traveler clearance at international border crossing points (BCPs)
has motivated research for finding more efficient solutions. Automated border control (ABC) …

[책][B] Privacy, security and trust in cloud computing

S Pearson - 2013 - Springer
Cloud computing refers to the underlying infrastructure for an emerging model of service
provision that has the advantage of reducing cost by sharing computing and storage …

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

M Deng, K Wuyts, R Scandariato, B Preneel… - Requirements …, 2011 - Springer
Ready or not, the digitalization of information has come, and privacy is standing out there,
possibly at stake. Although digital privacy is an identified priority in our society, few …

[PDF][PDF] Engineering privacy by design

S Gürses, C Troncoso, C Diaz - Computers, Privacy & Data …, 2011 - software.imdea.org
The design and implementation of privacy requirements in systems is a difficult problem and
requires the translation of complex social, legal and ethical concerns into systems …

[PDF][PDF] A critical review of 10 years of privacy technology

G Danezis, S Gürses - Proceedings of surveillance cultures …, 2010 - fahrplan.events.ccc.de
This paper is still being revised. It will eventually appear in the proceedings of the 2010
surveillance studies conference. It can then be cited as follows: George Danezis and Seda …

A digital twin-based privacy enhancement mechanism for the automotive industry

V Damjanovic-Behrendt - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
This paper discusses a Digital Twin demonstrator for privacy enhancement in the automotive
industry. Here, the Digital Twin demonstrator is presented as a method for the design and …

Cloud identity management: A survey on privacy strategies

J Werner, CM Westphall, CB Westphall - Computer Networks, 2017 - Elsevier
With the rise of cloud computing, thousands of users and multiple applications have sought
to communicate with each other, exchanging sensitive data. Thus, for effectively managing …

BlindIdM: A privacy-preserving approach for identity management as a service

D Nuñez, I Agudo - International Journal of Information Security, 2014 - Springer
Identity management is an almost indispensable component of today's organizations and
companies, as it plays a key role in authentication and access control; however, at the same …

The digitally extended self: A lexicological analysis of personal data

B Parkinson, DE Millard, K O'Hara… - Journal of Information …, 2018 - journals.sagepub.com
Individual's privacy, especially with regard to their personal data, is increasingly an area of
concern as people interact with a wider and more pervasive set of digital services …

Concepts and languages for privacy-preserving attribute-based authentication

J Camenisch, M Dubovitskaya, A Lehmann… - Policies and Research …, 2013 - Springer
Existing cryptographic realizations of privacy-friendly authentication mechanisms such as
anonymous credentials, minimal disclosure tokens, selfblindable credentials, and group …