Biometric recognition in automated border control: a survey
The increasing demand for traveler clearance at international border crossing points (BCPs)
has motivated research for finding more efficient solutions. Automated border control (ABC) …
has motivated research for finding more efficient solutions. Automated border control (ABC) …
[책][B] Privacy, security and trust in cloud computing
S Pearson - 2013 - Springer
Cloud computing refers to the underlying infrastructure for an emerging model of service
provision that has the advantage of reducing cost by sharing computing and storage …
provision that has the advantage of reducing cost by sharing computing and storage …
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
Ready or not, the digitalization of information has come, and privacy is standing out there,
possibly at stake. Although digital privacy is an identified priority in our society, few …
possibly at stake. Although digital privacy is an identified priority in our society, few …
[PDF][PDF] Engineering privacy by design
The design and implementation of privacy requirements in systems is a difficult problem and
requires the translation of complex social, legal and ethical concerns into systems …
requires the translation of complex social, legal and ethical concerns into systems …
[PDF][PDF] A critical review of 10 years of privacy technology
This paper is still being revised. It will eventually appear in the proceedings of the 2010
surveillance studies conference. It can then be cited as follows: George Danezis and Seda …
surveillance studies conference. It can then be cited as follows: George Danezis and Seda …
A digital twin-based privacy enhancement mechanism for the automotive industry
V Damjanovic-Behrendt - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
This paper discusses a Digital Twin demonstrator for privacy enhancement in the automotive
industry. Here, the Digital Twin demonstrator is presented as a method for the design and …
industry. Here, the Digital Twin demonstrator is presented as a method for the design and …
Cloud identity management: A survey on privacy strategies
With the rise of cloud computing, thousands of users and multiple applications have sought
to communicate with each other, exchanging sensitive data. Thus, for effectively managing …
to communicate with each other, exchanging sensitive data. Thus, for effectively managing …
BlindIdM: A privacy-preserving approach for identity management as a service
Identity management is an almost indispensable component of today's organizations and
companies, as it plays a key role in authentication and access control; however, at the same …
companies, as it plays a key role in authentication and access control; however, at the same …
The digitally extended self: A lexicological analysis of personal data
Individual's privacy, especially with regard to their personal data, is increasingly an area of
concern as people interact with a wider and more pervasive set of digital services …
concern as people interact with a wider and more pervasive set of digital services …
Concepts and languages for privacy-preserving attribute-based authentication
Existing cryptographic realizations of privacy-friendly authentication mechanisms such as
anonymous credentials, minimal disclosure tokens, selfblindable credentials, and group …
anonymous credentials, minimal disclosure tokens, selfblindable credentials, and group …