Privacy in the smart city—applications, technologies, challenges, and solutions

D Eckhoff, I Wagner - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …

Runtime verification for decentralised and distributed systems

A Francalanza, JA Pérez, C Sánchez - Lectures on Runtime Verification …, 2018 - Springer
This chapter surveys runtime verification research related to distributed systems. We report
solutions that study how to monitor system with some distributed characteristic, solutions that …

Monitoring metric first-order temporal properties

D Basin, F Klaedtke, S Müller, E Zălinescu - Journal of the ACM (JACM), 2015 - dl.acm.org
Runtime monitoring is a general approach to verifying system properties at runtime by
comparing system events against a specification formalizing which event sequences are …

Hi-fi: collecting high-fidelity whole-system provenance

DJ Pohly, S McLaughlin, P McDaniel… - Proceedings of the 28th …, 2012 - dl.acm.org
Data provenance---a record of the origin and evolution of data in a system---is a useful tool
for forensic analysis. However, existing provenance collection mechanisms fail to achieve …

A survey of challenges for runtime verification from advanced application domains (beyond software)

C Sánchez, G Schneider, W Ahrendt, E Bartocci… - Formal Methods in …, 2019 - Springer
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …

Bootstrap** privacy compliance in big data systems

S Sen, S Guha, A Datta, SK Rajamani… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
With the rapid increase in cloud services collecting and using user data to offer personalized
experiences, ensuring that these services comply with their privacy policies has become a …

A case study on runtime monitoring of an autonomous research vehicle (ARV) system

A Kane, O Chowdhury, A Datta, P Koopman - Runtime Verification: 6th …, 2015 - Springer
Runtime monitoring is a versatile technique for detecting property violations in safety-critical
(SC) systems. Although instrumentation of the system under monitoring is a common …

Proxy non-discrimination in data-driven systems

A Datta, M Fredrikson, G Ko, P Mardziel… - arxiv preprint arxiv …, 2017 - arxiv.org
Machine learnt systems inherit biases against protected classes, historically disparaged
groups, from training data. Usually, these biases are not explicit, they rely on subtle …

[HTML][HTML] Adopting security maturity model to the organizations' capability model

OMM Al-Matari, IMA Helal, SA Mazen… - Egyptian Informatics …, 2021 - Elsevier
Each organization faces threats and risks in daily operations. One of the main risks is how to
assess the security level to protect from the increasing risks associated with technology …

All eyes on me: Inside third party trackers' exfiltration of phi from healthcare providers' online systems

M Huo, M Bland, K Levchenko - Proceedings of the 21st Workshop on …, 2022 - dl.acm.org
In the United States, sensitive health information is protected under the Health Insurance
Portability and Accountability Act (HIPAA). This act limits the disclosure of Protected Health …