SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Albin Zuccato) "

Search: WFRF:(Albin Zuccato)

  • Result 1-10 of 22
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Akil, Mahdi, et al. (author)
  • Privacy-Preserving Identifiers for IoT : A Systematic Literature Review
  • 2020
  • In: IEEE Access. - : IEEE. - 2169-3536. ; 8, s. 168470-168485
  • Research review (peer-reviewed)abstract
    • The Internet of Things (IoT) paves the way for smart applications such as in E-health, E-homes, transportation, or energy production. However, IoT technologies also pose privacy challenges for their users, as they allow the tracking and monitoring of the users' behavior and context. The EU General Data Protection Regulation (GDPR) mandates data controller to follow a data protection by design and default approach by implementing for instance pseudonymity for achieving data minimisation. This paper provides a systematic literature review for answering the question of what types of privacy-preserving identifiers are proposed by the literature in IoT environments for implementing pseudonymity. It contributes with classifications and analyses of IoT environments for which privacy-preserving identifiers have been proposed and of the pseudonym types and underlying identity management architectures used. Moreover, it discusses trends and gaps in regard to addressing privacy trade-offs.
  •  
2.
  • Fischer-Hübner, Simone, 1963-, et al. (author)
  • A MOOC on Privacy by Design and the GDPR
  • 2018
  • In: Information Security Education. - Cham, Switzerland : Springer. - 9783319997346 ; , s. 95-107
  • Conference paper (peer-reviewed)abstract
    • In this paper we describe how we designed a massive open online course (mooc) on Privacy by Design with a focus on how to achieve compliance with the eu gdpr principles and requirements in it engineering and management. This mooc aims at educating both professionals and undergraduate students, i.e., target groups with distinct educational needs and requirements, within a single course structure. We discuss why developing and publishing such a course is a timely decision and fulfills the current needs of the professional and undergraduate education. The mooc is organized in five modules, each of them with its own learning outcomes and activities. The modules focus on different aspects of the gdpr that data protection officers have to be knowledgeable about, ranging from the legal basics, to data protection impact assessment methods, and privacy-enhancing technologies. The modules were delivered using hypertext, digital content and three video production styles: slides with voice-over, talking heads and interviews. The main contribution of this work is the roadmap on how to design a highly relevant mooc on privacy by design and the gdpr aimed at an heterogeneous audience.
  •  
3.
  • Fischer Hübner, Simone, et al. (author)
  • Proceedings of the IFIP WG 9.2, 9.6/11.7 Summer School on Risks and Challenges of the Network Society, Karlstad University Studies 2004:35, June 2004, ISBN 91-85335-03-7
  • 2004
  • Book (peer-reviewed)abstract
    • Mobile phones, i-Mode, WAP, telephone, fax, e-mail, Internet and personal digital assistants (PDAs) are dominating our society - which is fast becoming a Network society characterised by electronic communications. While these developments bring many social and economic benefits, they also pose several social, ethical, political and cultural consequences and challenges.The aim of the IFIP WG 9.2, 9.6/11.7 Summer School, which was held 4-8 August 2003 at Karlstad University - Sweden , was to discuss Risks and Challenges of the Network Society. This report collects the contributions of the participants which were presented and discussed during the Summer School
  •  
4.
  •  
5.
  • Leonardo A, Martucci, et al. (author)
  • Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
  • 2012
  • In: [Host publication title missing].
  • Conference paper (peer-reviewed)abstract
    • The telecommunication industry has been successful in turning the Internet into a mobile service and stimulating the creation of a new set of networked, remote services. Most of these services now run or are supported by cloud computing platforms. Embracing cloud computing solutions is fundamental for the telecommunication industry to remain competitive. However, there are many legal, regulatory, business, market-related and technical challenges that must be considered first. In this paper we list such challenges and define a set of privacy, security and trust requirements that must be taken into account before cloud computing solutions can be fully integrated and deployed by telecommunication providers.
  •  
6.
  • Martucci, Leonardo, et al. (author)
  • Identity Deployment and Management in Wireless Mesh Networks
  • 2007
  • Conference paper (peer-reviewed)abstract
    • This paper introduces the problem of combining securityand privacy-friendly provisioning in wireless mesh network environments. We present a set of non-functional requirements for a privacyfriendlyidentity management (IdM) system suitable for wireless mesh networks and derive another set of security and privacy properties for digital identifiers to be used in such networks. Later, we compare two existingidentifiers, anonymous attribute certificates and anonymous credentials, and verify if any of those conforms to our set of defined properties. A business model and some business cases are presented to supportand justify the need for a privacy-friendly IdM system not only from the security and privacy perspective, but also from a business-enabler perspective
  •  
7.
  • Martucci, Leonardo, 1977-, et al. (author)
  • Identity Depoyment and Management in Wireless Mesh Networks
  • 2008. - 1
  • In: The Future of Identity in the Information Society. - Boston, MA : Springer-Verlag New York. - 9781441946294 - 9780387790268 ; , s. 223-233
  • Book chapter (peer-reviewed)abstract
    • This paper introduces the problem of combining security and privacy-friendly provisioning in wireless mesh network environments. We present a set of non-functional requirements for a privacy-friendly identity management (IdM) system suitable for wireless mesh networks and derive another set of security and privacy properties for digital identifiers to be used in such networks. Later, we compare two existing identifiers, anonymous attribute certificates and anonymous credentials, and verify if any of those conforms to our set of defined properties. A business model and some business cases are presented to support and justify the need for a privacy-friendly IdM system not only from the security and privacy perspective, but also from a business-enabler perspective.
  •  
8.
  • Martucci, Leonardo, et al. (author)
  • Privacy, Security and Trust in Cloud Computing : The Perspective of the Telecommunication Industry
  • 2012
  • In: Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012. - : IEEE COMPUTER SOC. - 9781467330848 - 9780769548432 ; , s. 627-632
  • Conference paper (peer-reviewed)abstract
    • The telecommunication industry has been successful in turning the Internet into a mobile service and stimulating the creation of a new set of networked, remote services. In this paper we argue that embracing cloud computing solutions is fundamental for the telecommunication industry to remain competitive. However, there are legal, regulatory, business, market-related and technical challenges that must be considered. In this paper we list such challenges and define a set of privacy, security and trust requirements that must be taken into account before cloud computing solutions can be fully integrated and deployed by telecommunication providers.
  •  
9.
  • Pettersson, John Sören, et al. (author)
  • HumanIT 2003
  • 2003
  • Book (peer-reviewed)abstract
    • The Centre for HumanIT at Karlstad University aims at strengthening research on "the Human aspects of IT". The present volume consists of contributions from seventeen of the researchers and research students involved in HumanIT activities during the last three years. Some chapters report past activities, some are directed more towards future research activities. The contributions span from the linguistic details of Internet chats, over IT-related stress and privacy risk management, to using ICT to alleviate poverty in the large portions of the world where no-one has ever used any kind of IT appliance. The volume also includes an introduction to the Centre itself.The Swedish Knowledge Foundation (KK-Stiftelsen) has supported HumanIT by a special Platform grant to Karlstad University during January 2001-August 2003. The mentors of this Platform project have provided a preface to the present volume.ContentsBridging the Digital Divide - ICT Solutions Supporting Economic and Social Development for the Unseen MajoritySusanne Sundén & Gudrun WicanderReflecting on ICT and Stress: Conceptual Connections and a Suggested ApplicationBirgitta Johansson-Hidén, Erik Wästlund & Susanne WallinLearning and Understanding E-commerceSten CarlssonPrivacy Risk Management in a Business EnvironmentAlbin ZuccatomCrowds: Anonymity for the Mobile InternetChrister Andersson, Simone Fischer-Hübner & Reine LundinInformation Architecture - a Descriptive OverviewChrister ClerwallThe Trade-off Between Latency and Image Quality on the Web: A User PerspectiveKatarina Asplund & Anna BrunströmTowards a Better System for Text Predicition in Mobile PhonesYlva Hård af SegerstadThe Significance of English Content in a Swedish Web ChatMalin SveningssonOzlab - a System Overview with an Account of Two Years of ExperiencesJohn Sören PetterssonEnterprise Modeling Approach for Information Systems EngineeringPrima Gustiene
  •  
10.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 22

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view