SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Fischer Berthold) "

Sökning: WFRF:(Fischer Berthold)

  • Resultat 1-8 av 8
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Berthold, Stefan, et al. (författare)
  • Crime and Punishment in the Cloud : Accountability, Transparency, and Privacy
  • 2013
  • Konferensbidrag (refereegranskat)abstract
    • The goal of this work is to reason on the complexity of the relationship between three non-functional requirements in cloud comput-ing; privacy, accountability, and transparency. We provide insights on the complexity of this relationship from the perspectives of end-users, cloud service providers, and third parties, such as auditors. We shed light onthe real and perceived conflicts between privacy, transparency, and accountability, using a formal definition of transparency and an analysis on how well a privacy-preserving transparency-enhancing tool may assist in achieving accountability. Furthermore, we highlight the importance of the privacy impact assessment process for the realisation of both transparency and accountability.
  •  
3.
  • Berthold, Stefan (författare)
  • Inter-temporal Privacy Metrics
  • 2014
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Informational privacy of individuals has significantly gained importance after information technology has become widely deployed. Data, once digitalised, can be copied, distributed, and long-term stored at negligible costs. This has dramatic consequences for individuals that leave traces in the form of personal data whenever they interact with information technology, for instance, computers and phones; or even when information technology is recording the personal data of aware or unaware individuals. The right of individuals for informational privacy, in particular to control the flow and use of their personal data, is easily undermined by those controlling the information technology.The objective of this thesis is to study the measurement of informational privacy with a particular focus on scenarios where an individual discloses personal data to a second party which uses this data for re-identifying the individual within a set of other individuals. We contribute with privacy metrics for several instances of this scenario in the publications included in this thesis, most notably one which adds a time dimension to the scenario for modelling the effects of the time passed between data disclosure and usage. The result is a new framework for inter-temporal privacy metrics.
  •  
4.
  • Berthold, Stefan, 1982- (författare)
  • Towards Inter-temporal Privacy Metrics
  • 2011
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Informational privacy of individuals has significantly gained importance after information technology has become widely deployed. Data, once digitalised, can be copied and distributed at negligible costs. This has dramatic consequences for individuals that leave traces in form of personal data whenever they interact with information technology. The right of individuals for informational privacy, in particular to control the flow and use of their personal data, is easily undermined by those controlling the information technology. The objective of this thesis is the measurement of informational privacy with a particular focus on scenarios where an individual discloses personal data to a second party, the data controller, which uses this data for re-identifying the individual within a set of others, the population. Several instances of this scenario are discussed in the appended papers, most notably one which adds a time dimension to the scenario for modelling the effects of the time passed between data disclosure and usage. This extended scenario leads to a new framework for inter-temporal privacy metrics. The common dilemma of all privacy metrics is their dependence on the information available to the data controller. The same information may or may not be available to the individual and, as a consequence, the individual may be misguided in his decisions due to his limited access to the data controller’s information when using privacy metrics. The goal of this thesis is thus not only the specification of new privacy metrics, but also the contribution of ideas for mitigating this dilemma. However a solution will rather be a combination of technological, economical and legal means than a purely technical solution.
  •  
5.
  • Fischer-Hübner, Simone, et al. (författare)
  • Privacy-Enhancing Technologies
  • 2013. - 2
  • Ingår i: Computer and Information Security Handbook. - : Elsevier. - 9780123943972 ; , s. 755-772
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • In our modern information age, recent technical developments and trends, such as mobile and pervasive computing, cloud computing, and Web 2.0 applications, increasingly pose privacy dilemmas. Due to the low costs and technical advances of storage technologies, masses of personal data can easily be stored. Once disclosed, these data may be retained forever, often without the knowledge of the individuals concerned, and be removed with difficulty. Hence, it has become hard for individuals to manage and control their personal spheres. Both legal and technical means are needed to protect privacy and to (re)establish the individuals’ control. This chapter provides an overview to the area of privacy-enhancing technologies (PETs), which help to protect privacy by technically enforcing legal privacy principles. It will start with defining the legal foundations of PETs and will present a classification of PETs as well as a definition of traditional privacy properties that PETs are addressing and metrics for measuring the level of privacy that PETs are providing. Then, a selection of the most relevant PETs is presented.
  •  
6.
  • Fischer-Hübner, Simone, 1963-, et al. (författare)
  • Privacy Enhancing Technologies.
  • 2017. - 3
  • Ingår i: Computer and Information Security Handbook. - : Morgan Kaufmann Publishers. - 9780128039298 - 9780128038437 ; , s. 759-778
  • Bokkapitel (refereegranskat)abstract
    • In our modern information age, recent technical developments and trends, such as mobile and pervasive computing, big data, cloud computing, and Web 2.0 applications, increasingly pose privacy dilemmas. Due to the low costs and technical advances of storage technologies, masses of personal data can easily be stored. Once disclosed, these data may be retained forever, often without the knowledge of the individuals concerned, and be removed with difficulty. Hence, it has become hard for individuals to manage and control their personal spheres. Both legal and technical means are needed to protect privacy and to (re-)establish the individuals' control. This chapter provides an overview to the area of Privacy-Enhancing Technologies (PETs), which help to protect privacy by technically enforcing legal privacy principles. It will start with defining the legal foundations of PETs, and will present a classification of PETs as well as a definition of traditional privacy properties that PETs are addressing and metrics for measuring the level of privacy that PETs are providing. Then, a selection of the most relevant PETs is presented.
  •  
7.
  • Micke, Patrick, et al. (författare)
  • Characterization of c-kit expression in small cell lung cancer : prognostic and therapeutic implications
  • 2003
  • Ingår i: Clinical Cancer Research. - 1078-0432 .- 1557-3265. ; 9:1, s. 188-194
  • Tidskriftsartikel (refereegranskat)abstract
    • PURPOSE: The tyrosine-kinase receptor c-kit and its ligand stem cell factor are coexpressed in many small cell lung cancer (SCLC) cell lines, leading to the hypothesis that this coexpression constitutes an autocrine growth loop. To further evaluate the frequency and pathogenic relevance of c-kit expression, tumor tissue together with the corresponding clinical data of SCLC patients was analyzed. EXPERIMENTAL DESIGN: Tumor tissue of 102 consecutive SCLC cancer patients was analyzed immunohistochemically using an affinity-purified polyclonal c-kit antibody. Immunostaining data were correlated with survival and other relevant clinical parameters. RESULTS: A positive c-kit expression was observed in 37% of patients. c-kit expression was associated with decreased survival in the likelihood-ratio-forward selection model of the Cox regression including clinically relevant risk factors (c-kit expression, age, gender, stage, tumor stage, node stage, metastasis stage, weight loss, performance status, response to chemotherapy, lactate dehydrogenase, neuronspecific enolase, hemoglobin). Only c-kit expression [hazard ratio, 2.00; confidence interval (CI), 1.17-3.41; P = 0.012], response to chemotherapy (hazard ratio, 4.49; CI, 2.36-8.55; P < 0.001), and tumor stage (hazard ratio, 2.11; CI, 1.18-3.74; P = 0.008) were explanatory prognostic factors. These factors and all possible interactions between them were further analyzed in a second Cox regression model. As expected, response to chemotherapy had the highest impact on survival (hazard ratio, 3.06; CI, 1.69-5.54; P < 0.001). In patients with extensive disease, minor response to chemotherapy, and positive c-kit expression, the risk to die increased to 8.4 (hazard ratio, 2.74; CI, 1.52-4.91; P = 0.002). In a Kaplan-Meier analysis median survival of patients with minor response to chemotherapy and extensive stage was 288 days (CI, 255-321 days) when c-kit expression was negative compared with only 71 days (CI, 0-237 days) for c-kit-positive patients (log rank test: P = 0.003). CONCLUSIONS: c-kit represents a new prognostic factor in SCLC. c-kit expression is of particular clinical relevance in patients with advanced disease and poor response to chemotherapy. Given the very limited therapeutic options and unfavorable prognosis of these patients, clinical studies aimed at targeting c-kit (e.g., STI571) are clearly warranted.
  •  
8.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-8 av 8

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy