Privacy in the smart city—applications, technologies, challenges, and solutions
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …
create so-called smart cities. Smart cities rely on a large number of application areas and …
Runtime verification for decentralised and distributed systems
This chapter surveys runtime verification research related to distributed systems. We report
solutions that study how to monitor system with some distributed characteristic, solutions that …
solutions that study how to monitor system with some distributed characteristic, solutions that …
Monitoring metric first-order temporal properties
Runtime monitoring is a general approach to verifying system properties at runtime by
comparing system events against a specification formalizing which event sequences are …
comparing system events against a specification formalizing which event sequences are …
Hi-fi: collecting high-fidelity whole-system provenance
Data provenance---a record of the origin and evolution of data in a system---is a useful tool
for forensic analysis. However, existing provenance collection mechanisms fail to achieve …
for forensic analysis. However, existing provenance collection mechanisms fail to achieve …
A survey of challenges for runtime verification from advanced application domains (beyond software)
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …
execution traces against formal specifications. Typically, the two main activities in runtime …
Bootstrap** privacy compliance in big data systems
With the rapid increase in cloud services collecting and using user data to offer personalized
experiences, ensuring that these services comply with their privacy policies has become a …
experiences, ensuring that these services comply with their privacy policies has become a …
A case study on runtime monitoring of an autonomous research vehicle (ARV) system
Runtime monitoring is a versatile technique for detecting property violations in safety-critical
(SC) systems. Although instrumentation of the system under monitoring is a common …
(SC) systems. Although instrumentation of the system under monitoring is a common …
Proxy non-discrimination in data-driven systems
Machine learnt systems inherit biases against protected classes, historically disparaged
groups, from training data. Usually, these biases are not explicit, they rely on subtle …
groups, from training data. Usually, these biases are not explicit, they rely on subtle …
[HTML][HTML] Adopting security maturity model to the organizations' capability model
Each organization faces threats and risks in daily operations. One of the main risks is how to
assess the security level to protect from the increasing risks associated with technology …
assess the security level to protect from the increasing risks associated with technology …
All eyes on me: Inside third party trackers' exfiltration of phi from healthcare providers' online systems
In the United States, sensitive health information is protected under the Health Insurance
Portability and Accountability Act (HIPAA). This act limits the disclosure of Protected Health …
Portability and Accountability Act (HIPAA). This act limits the disclosure of Protected Health …