Searched for: subject%3A%22Privacy%22
(41 - 60 of 97)

Pages

document
Duijsens, Remy (author)
Digital identity management has been established in a mainly centralized manner. In response to a lack of control in current identity management systems, the concept of Self-Sovereign Identity (SSI) was defined to enable decentralization. Recently, this concept gained traction, and several implementations have been proposed. The decentralized...
bachelor thesis 2021
document
Stepanov, Paul (author)
The following paper aims to investigate what and how are the main privacy-preserving methods applied in the blockchain-based supply chain industry scenario, with a primary focus on the food sector. Recent developments, such as the exordium of cryptocurrencies to increment efficiency, are withal addressed. Overviews of key use cases in industry...
bachelor thesis 2021
document
Jacobs, Ben (author)
The health industry is a data-intensive domain. Sharing medical data between medical facilities is necessary for providing good healthcare as well as for research in the healthcare domain. However, due to the sensitive and personal nature of health data, challenges arise when sharing this data. Consent management is a key aspect. The use of...
bachelor thesis 2021
document
Joshi, Ayush (author)
Supply chains are vital to the global economy, and so, increasing efficiency in supply chain management is of utmost importance. Modernizing technology has allowed for various uses of machine learning to be possible in several aspects of supply chains, specifically in demand forecasting with prediction models, and customer relations with chat...
bachelor thesis 2021
document
Guettache, Karim (author)
The sharing of medical data is becoming ever more important. More and more health-related data is being generated everyday and as will be shown later, its primary as well as its secondary usage brings many benefits to the healthcare system. However, medical data systems are not fail proof and are often the target of cyber-attacks, compromising...
bachelor thesis 2021
document
Smith, Marcus (author), Miller, S.R.M. (author)
Genomic data is growing in importance as scientific knowledge and technology develop, and in availability, as direct-to-consumer genomic health testing and recreational genealogy services become more widely utilized. Access to genomic data needs to be considered in light of individual privacy. Cross-sector use of genomic health and ancestry data...
journal article 2021
document
Rikken, O.K. (author), Janssen, M.F.W.H.A. (author), Roosenboom-Kwee, Z. (author), Büttgen, Marion (author), Dicenta, Julia (author), Spohrer, Kai (author), Venkatesh, Viswanath (author), Raman, Rajalakshmi (author), Hoehle, Hartmut (author), De Keyser, Arne (author)
As blockchain technology is maturing to be confidently used in practice, its applications are becoming evident and, correspondingly, more blockchain research is being published, also extending to more domains than before. To date, scientific research in the field has predominantly focused on subject areas such as finance, computer science, and...
journal article 2021
document
Li, Meng (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Martinelli, Fabio (author)
Vehicular networks allow billions of vehicular users to be connected to report and exchange real-time data for offering various services, such as navigation, ride-hailing, smart parking, traffic monitoring, and vehicular digital forensics. Fifth generation (5G) is a new radio access technology with greater coverage, accessibility, and higher...
journal article 2021
document
Li, Qiongxiu (author), Heusdens, R. (author), Christensen, M. Graesboll (author)
Over the past decades, privacy-preservation has received considerable attention, not only as a consequence of regulations such as the General Data Protection Regulation in the EU, but also from the fact that people are more concerned about data abuse as the world is becoming increasingly digitized. In this paper we propose a convex optimization...
conference paper 2020
document
Ho-Sam-Sooi, Nick (author)
Given the significant privacy and security risks of IoT devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account when purchasing these devices. In order to support this goal, this study has examined the effect of security and privacy on IoT device purchase behaviour and assessed whether...
master thesis 2020
document
Hafeez, Ibbad (author), Antikainen, Markku (author), Ding, Aaron Yi (author), Tarkoma, Sasu (author)
IoT devices are notoriously vulnerable even to trivial attacks and can be easily compromised. In addition, resource constraints and heterogeneity of IoT devices make it impractical to secure IoT installations using traditional endpoint and network security solutions. To address this problem, we present IoT-Keeper, a lightweight system which...
journal article 2020
document
Li, Qiongxiu (author), Heusdens, R. (author), Christensen, Mads Græsbøll (author)
In many applications of wireless sensor networks, it is important that the privacy of the nodes of the network be protected. Therefore, privacy-preserving algorithms have received quite some attention recently. In this paper, we propose a novel convex optimization-based solution to the problem of privacy-preserving distributed average consensus....
conference paper 2020
document
Benchaya Gans, R (author), Ubacht, J. (author), Janssen, M.F.W.H.A. (author)
Whereas part of the world can benefit from the wonders of digital technologies, undocumented migrants, asylum seekers,and refugees are facing the rough reality of being “invisible” in society and ignored by governments. During the COVID-19 pandemic, the economic impact of the closure of the service industry and the impossibility to keep most of...
journal article 2020
document
Enthoven, David (author)
With the increasing number of data collectors such as smartphones, immense amounts of data are available. These data have great value for training machine learning models. Federated learning is a distributed machine learning approach that allows a machine learning model to train on a distributed data-set without transferring any data and...
master thesis 2019
document
Nateghizad, M. (author)
In order to achieve practical e-healthcare systems, five requirements should be addressed, namely 1) availability, 2) integrity, 3) accuracy, 4) confidentiality, and 5) efficiency. Using remote computer storage and processing services satisfies availability, integrity, and efficiency. However, it introduces privacy concerns regarding the leakage...
doctoral thesis 2019
document
Sabée, Wendo (author)
Privacy in the Internet is under attack by governments and companies indiscriminately spying on everyone. The anonymity network Tor is a solution to restore some privacy, however, Tor is slow in both bandwidth and latency. It uses a TCP-based connection to multiplex different circuits between nodes and this causes different independent circuits...
master thesis 2019
document
Ishmaev, G. (author)
The moral significance of blockchain technologies is a highly debated and polarised topic, ranging from accusations that cryptocurrencies are tools serving only nefarious purposes such as cybercrime and money laundering, to the assessment of blockchain technology as an enabler for revolutionary positive social transformations of all kinds. Such...
doctoral thesis 2019
document
Quaedvlieg, Felix (author)
As more consumer products and services are getting intelligent and collect data about the user, privacy has become an important topic of debate in society. New rules and legislation are being implemented to safeguard the user’s privacy. In addition, from a technological perspective, developments like the creation of the seven principles of ...
master thesis 2019
document
Dalla Corte, L. (author)
The concept of personal data - any information relating to an identified or identifiable natural person - is a cornerstone of the European data protection framework since its very inception. The processing of personal data is a conditio sine qua non for the applicability of EU data protection law. Despite the crucial importance of the notion,...
journal article 2019
document
Łęcka, Agnieszka (author)
In the times of emerging technologies and rising individuals’ awareness more light is shed on privacy and associated risks. This does not go unnoticed by regulators, that develop and enforce tighter requirements towards organisations. Simultaneously, outsourcing relationships develop and offshoring as well as nearshoring are still popular among...
master thesis 2018
Searched for: subject%3A%22Privacy%22
(41 - 60 of 97)

Pages