[PDF][PDF] Cloud forensics issues and opportunities

A Aminnezhad, A Dehghantanha… - International Journal of …, 2013 - academia.edu
Cloud computing technology is a rapidly growing field of study, which relies on sharing
computing resources rather than having local servers or personal devices to handle …

[Retracted] Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications

S Raghavendra, P Srividya, M Mohseni… - Security and …, 2022 - Wiley Online Library
Using cloud computing, businesses can adopt IT without incurring a significant upfront cost.
The Internet has numerous benefits, but model security remains a concern, which affects …

Explainable machine learning for default privacy setting prediction

S Löbner, WB Tesfay, T Nakamura, S Pape - IEEE Access, 2021 - ieeexplore.ieee.org
When requesting a web-based service, users often fail in setting the website's privacy
settings according to their self privacy preferences. Being overwhelmed by the choice of …

CPPL: compact privacy policy language

M Henze, J Hiller, S Schmerling, JH Ziegeldorf… - Proceedings of the …, 2016 - dl.acm.org
Recent technology shifts such as cloud computing, the Internet of Things, and big data lead
to a significant transfer of sensitive data out of trusted edge networks. To counter resulting …

PPM: Privacy policy manager for personalized services

S Kiyomoto, T Nakamura, H Takasaki… - … , Reliability, and Security, 2013 - Springer
In this paper, we introduce a new architecture for personalized services. The architecture
separates access control using a user own privacy policy from data storage for private …

Adaptive traffic fingerprinting for darknet threat intelligence

H Haughey, G Epiphaniou, H Al-Khateeb… - Cyber Threat …, 2018 - Springer
Darknet technology such as Tor has been used by various threat actors for organising illegal
activities and data exfiltration. As such there is a case for organisations to block such traffic …

Easing the burden of setting privacy preferences: A machine learning approach

T Nakamura, S Kiyomoto, WB Tesfay… - … Systems Security and …, 2017 - Springer
Abstract Setting appropriate privacy preferences is both a difficult and cumbersome task for
users. In this paper, we propose a solution to address users' privacy concerns by easing the …

[PDF][PDF] PPM: Privacy Policy Manager for Home Energy Management System.

MS Rahman, A Basu, T Nakamura, H Takasaki… - J. Wirel. Mob. Networks …, 2018 - jowua.com
The smart grid has been a popular technology for the power grid system. In order to optimize
the power supply and distribution, and to provide personalized services by service …

Ambient intelligence in business environments and internet of things transformation guidelines

KA Demir, B Turan, T Onel, T Ekin, S Demir - Guide to Ambient Intelligence …, 2019 - Springer
Ambient intelligence (AmI) is an emerging paradigm bringing intelligence into our lives with
the help of intelligent interfaces and smart environments. AmI has the potential to affect our …

[PDF][PDF] Dynamic privacy adaptation in ubiquitous computing

FM Schaub - 2014 - oparu.uni-ulm.de
Ubiquitous computing is characterized by the integration of computing aspects into the
physical environment. Physical objects gain digital sensing, processing, and communication …