SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Martucci Leonardo A.) "

Sökning: WFRF:(Martucci Leonardo A.)

  • Resultat 1-10 av 14
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Iwaya, Leonardo H., et al. (författare)
  • Firewall Usability and Visualization : A Systematic Literature Review
  • 2016
  • Rapport (refereegranskat)abstract
    • Firewalls are network security components that allow administrators to handle incoming and outgoing traffic based on a set of rules. Such security appliances are typically the first line of defense, creating a barrier between organization’s internal network and the outside network (e.g., Internet). The process of correctly configuring a firewall is complex and error prone, and it only gets worse as the complexity of the network grows. A vulnerable firewall configuration will very likely result in major threats to the organization’s security. In this report we aim to investigate how to make administrator task of planning and implementing firewall solutions easier, from the stand points of usability and visualization. Our scientific investigation starts with the understanding of the state-of-the-art on this specific field. To do so, we conducted a Systematic Literature Review (SLR), a strict methodology to plan a literature review, to gather relevant information, to synthesize and compare approaches, and to report findings. During the initial search process thousands of papers were screened, leading us to 125 papers carefully selected for further readings. In the secondary study, ten relevant works were identified and assessed, in which authors tackled the issues of usability and visualization for Firewalls and Personal Firewalls. Among the main findings, we perceive that there is a lack (or even absence) of user studies to validate the proposed models. This leads us to a series of unwarranted solutions, that need to be prototyped and tested with real users. We also see an huge opportunity for integrative approaches, that could combine firewall research areas, such as automatic anomaly detection, advisory systems, and varying visualization schemes.
  •  
2.
  • Andersson, Christer, 1975-, et al. (författare)
  • Privacy & Anonymity in Mobile Ad Hoc Networks
  • 2008
  • Ingår i: Handbook of Research on Wireless Security. - : IGI Global. - 9781599048994
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)
  •  
3.
  •  
4.
  •  
5.
  • Fischer-Hübner, Simone, et al. (författare)
  • Privacy in Social Collective Intelligence Systems
  • 2014. - 1
  • Ingår i: Social Collective Intelligence. - Switzerland : Springer. - 9783319086804 ; , s. 105-124
  • Bokkapitel (refereegranskat)abstract
    • The impact of Social Collective Intelligent Systems (SCIS) on the individual right of privacy is discussed in this chapter under the light of the relevant privacy principles of the European Data Protection Legal Framework and the Organization for Economic Co-operation and Development (OECD) Privacy Guidelines. This chapter analyzes the impact and limits of profiling, provenance and reputation on the right of privacy and review the legal privacy protection for profiles. From the technical perspective, we discuss opportunities and challenges for designing privacy-preserving systems for SCIS concerning collectives and decentralized systems. Furthermore, we present a selection of privacy-enhancing technologies that are relevant for SCIS: anonymous credentials, transparency-enhancing tools and the PrimeLife Policy Language. Finally, we discuss how these technologies can help to enforce the main legal principles of the European Data Protection Legal Framework, and argue how provenance and reputation can be designed in a privacy preserving manner.
  •  
6.
  • Leonardo A, Martucci, et al. (författare)
  • Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
  • 2012
  • Ingår i: [Host publication title missing].
  • Konferensbidrag (refereegranskat)abstract
    • The telecommunication industry has been successful in turning the Internet into a mobile service and stimulating the creation of a new set of networked, remote services. Most of these services now run or are supported by cloud computing platforms. Embracing cloud computing solutions is fundamental for the telecommunication industry to remain competitive. However, there are many legal, regulatory, business, market-related and technical challenges that must be considered first. In this paper we list such challenges and define a set of privacy, security and trust requirements that must be taken into account before cloud computing solutions can be fully integrated and deployed by telecommunication providers.
  •  
7.
  •  
8.
  • Martucci, Leonardo A., 1977- (författare)
  • Contributions of LiU/ADIT to Informational Privacy
  • 2012
  • Ingår i: Advances in secure and networked information systems. - Linköping : Linköping University Electronic Press. - 9789175197173 ; , s. 145-155
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • In this article we provide an overview of the contributions of LiU/ADIT to the field of informational privacy. We refer to some recent publications of our group in the area related to Cloud Computing and the Smart Grid. Furthermore, we revisit our results in the field of privacy in participatory sensing, which is a new paradigm that is grounded on the ubiquitous presence of sensors in personal devices, such as smart phones.
  •  
9.
  •  
10.
  • Martucci, Leonardo A., 1977-, et al. (författare)
  • Towards Anonymity in Mobile Ad Hoc Networks : The Chameleon Protocol and its Anonymity Analysis
  • 2006
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • This paper presents Chameleon, a novel anonymous overlay network for mobile ad hoc environments. As far we know, Chameleon is the first low-latency anonymous overlay network applied in a mobile ad hoc setting. It was designed with the special characteristics of mobile ad hoc networks in mind, such as limited battery lifetime, user mobility and vanishing nodes. In this paper, we also evaluate Chameleon against a number of requirements that an anonymous overlay network should adhere to in order to be suitable for mobile ad hoc networks. In particular, the anonymity properties of Chameleon are thoroughly analyzed.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 14

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy