Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Danny S. Guamán"'
Publikováno v:
Computers & Security. 130:103262
Publikováno v:
Maskana, Vol 5, Iss Ed. Esp. (2016)
Active response systems are intended to run an automatic response against an intrusion. However, running an automatic response is not a trivial task because the execution cost could cause a greater negative effect than the intrusion itself. Also, the
Externí odkaz:
https://doaj.org/article/f549d8b6bd8e45649de25cb45f51e837
Publikováno v:
Electronics, Vol 10, Iss 1999, p 1999 (2021)
Electronics
Volume 10
Issue 16
Electronics
Volume 10
Issue 16
Android apps are daily installed by billions of users worldwide, who grant access to an extensive set of sensitive personal data. Different techniques have been developed over the years to understand how apps protect or harm their users’ privacy. H
Reusable Elements for the Systematic Design of Privacy-Friendly Information Systems: A Mapping Study
Publikováno v:
IEEE Access
IEEE Access, ISSN 2169-3536, 2019-05, Vol. 7
Archivo Digital UPM
Universidad Politécnica de Madrid
IEEE Access, Vol 7, Pp 66512-66535 (2019)
IEEE Access, ISSN 2169-3536, 2019-05, Vol. 7
Archivo Digital UPM
Universidad Politécnica de Madrid
IEEE Access, Vol 7, Pp 66512-66535 (2019)
Privacy by design is a new paradigm that promotes embedding privacy considerations throughout the development of information systems, to protect user privacy. Privacy engineering is the nascent field of research and practice that aims to realize this
Publikováno v:
IEEE Access, ISSN 2169-3536, 2021-01-20, Vol. 9
Archivo Digital UPM
Universidad Politécnica de Madrid
IEEE Access, Vol 9, Pp 15961-15982 (2021)
Archivo Digital UPM
Universidad Politécnica de Madrid
IEEE Access, Vol 9, Pp 15961-15982 (2021)
The pervasiveness of Android mobile applications and the services they support allow the personal data of individuals to be collected and shared worldwide. However, data protection legislations usually require all participants in a personal data flow
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7c7d667fa0fc96ae3eb32b852df2834f
http://oa.upm.es/66367/
http://oa.upm.es/66367/
Publikováno v:
The 36th ACM/SIGAPP Symposium On Applied Computing | The 36th ACM/SIGAPP Symposium On Applied Computing | 22/03/2021-26/03/2021 | Gwangju, South Korea (Virtual conference)
Archivo Digital UPM
Universidad Politécnica de Madrid
SAC
Archivo Digital UPM
Universidad Politécnica de Madrid
SAC
Several1 privacy engineering methods and techniques have built on privacy patterns for materializing the Privacy by Design paradigm. Also, reports by data protection and cybersecurity authorities have recommended them. However, the benefits that thei
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::47a29eb0dece8aab4d0098a167942b01
https://oa.upm.es/66374/
https://oa.upm.es/66374/
Publikováno v:
IEEE Access, ISSN 2169-3536, 2020-04-16, Vol. 8
Archivo Digital UPM
Universidad Politécnica de Madrid
IEEE Access, Vol 8, Pp 74808-74833 (2020)
Archivo Digital UPM
Universidad Politécnica de Madrid
IEEE Access, Vol 8, Pp 74808-74833 (2020)
Software Quality Control (SQC) techniques are widely used throughout the software development process with the objective of assessing and detecting anomalies that affect the quality of an information system. Privacy is one quality attribute of softwa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c1cb489f0609db84d1c5d66d648808f1
http://oa.upm.es/66366/
http://oa.upm.es/66366/
Publikováno v:
SAC
Privacy patterns have become a cornerstone of the Privacy by Design paradigm realization by being used in different methodologies, strategies, tools, and many other privacy engineering proposals reported in the state-of-the-art. While these proposals
Autor:
Jose M. Del Alamo, Anna Haselbacher, Stefan Egon Reichmann, Danny S. Guamán, Hristina Veljanova
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783030337155
IFIPTM
Proceedings of 13th IFIP International Conference on Trust Management (IFIPTM 2019) | 13th IFIP International Conference on Trust Management (IFIPTM 2019) | 17/07/2019-19/07/2019 | Copenhagen, Dinamarca
Archivo Digital UPM
Universidad Politécnica de Madrid
IFIP Advances in Information and Communication Technology
13th IFIP International Conference on Trust Management (IFIPTM)
13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.81-97, ⟨10.1007/978-3-030-33716-2_7⟩
IFIPTM
Proceedings of 13th IFIP International Conference on Trust Management (IFIPTM 2019) | 13th IFIP International Conference on Trust Management (IFIPTM 2019) | 17/07/2019-19/07/2019 | Copenhagen, Dinamarca
Archivo Digital UPM
Universidad Politécnica de Madrid
IFIP Advances in Information and Communication Technology
13th IFIP International Conference on Trust Management (IFIPTM)
13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.81-97, ⟨10.1007/978-3-030-33716-2_7⟩
International audience; In the digital domain, users can be expected to place their trust in online services if they have a reason to believe that, in addition to the functional and quality of service aspects, their rights will be protected and their
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8b7550ac9cabc416ef1e56f8a8b444b8
https://doi.org/10.1007/978-3-030-33716-2_7
https://doi.org/10.1007/978-3-030-33716-2_7
Publikováno v:
Enfoque UTE. 6:36-51
This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the