Dissertationen zum Thema „Privicy protection“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Privicy protection" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Maifada, Magoudani Mahamadou. „Construire et mettre en œuvre un droit des données personnelles dans l’espace UEMOA : étude comparée à partir des cas du Burkina Faso, de la Côte d’Ivoire, du Niger et du Sénégal à la lumière du droit français et européen“. Electronic Thesis or Diss., Paris 12, 2023. http://www.theses.fr/2023PA120073.
Der volle Inhalt der QuelleThis thesis provides an in-depth analysis of the legal framework surrounding the protection of personal data within the West African Economic and Monetary Union (WAEMU), specifically focusing on Burkina Faso, Côte d'Ivoire, Niger, and Senegal – the areas under study. It delves into the motivations that led these states to adopt specific legislations influenced by foreign models, notably the French model of the "Loi Informatique et Libertés," rather than relying on national or community references.This analysis explores the development process of these regulations, from legislative evolution to international institutions' initiatives. Special attention is given to the influence of the International Organization of La Francophonie (IOF) and the French Commission for Data Protection (Commission de l'Informatique et des Libertés) in promoting the initial national legislations within this region.Furthermore, the thesis conducts a detailed comparison between the existing regulations within WAEMU and the European Union's General Data Protection Regulation (GDPR). This comparison highlights significant similarities and differences, particularly concerning the scope of application, stakeholders' responsibilities, and the rights of the individuals concerned.Moreover, the study examines the practical implementation of these regulations, focusing on key actors, including regulatory authorities, data controllers, Civil Society Organizations (CSOs), and data subjects in each state. It analyzes the challenges faced by regulatory authorities and cooperation policies aimed at enhancing the effectiveness of personal data rights.Finally, the thesis explores the limitations of personal data rights, particularly in their interaction with public policies in the telecommunications sector and the issues related to cybercrime.Overall, this work offers a comprehensive and nuanced perspective on personal data rights within WAEMU, shedding light on the motivations, achievements, challenges, and prospects in the ever-evolving African legal context. It constitutes a significant contribution to the understanding of personal data protection in the African legal context
Sallaku, Redlon <1994>. „Privacy and Protecting Privacy: Using Static Analysis for legal compliance. General Data Protection Regulation“. Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14682.
Der volle Inhalt der QuelleLi, Min. „Privacy Protection on Cloud Computing“. VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3844.
Der volle Inhalt der QuelleXu, Wanxin. „AFFECT-PRESERVING VISUAL PRIVACY PROTECTION“. UKnowledge, 2018. https://uknowledge.uky.edu/ece_etds/122.
Der volle Inhalt der QuelleWinkler, Stephanie D. „Protecting Online Privacy“. UKnowledge, 2016. http://uknowledge.uky.edu/comm_etds/47.
Der volle Inhalt der QuelleGunnarsson, Annicka, und Siri Ekberg. „Invasion of Privacy : Spam - one result of bad privacy protection“. Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5393.
Der volle Inhalt der QuelleMatusek, F. (Florian). „Selective privacy protection for video surveillance“. Doctoral thesis, Oulun yliopisto, 2014. http://urn.fi/urn:isbn:9789526204154.
Der volle Inhalt der QuelleTiivistelmä Videovalvonnassa on tapahtunut viime vuosina merkittävää kasvua johtuen järkyttävistä tapahtumista kuten terrori-iskut, pankkiryöstöt ja järjestäytyneen rikollisuuden toimet. Videovalvontateknologia on kehittynyt merkittävästi mahdollistaen jopa yksittäisten ihmisten automaattisen seurannan. Turvallisuuden lisääntymisen katsotaan kuitenkin vähentäneen yksityisyyttä. Videovalvonnan avulla ihmisiä pystytään seuraamaan helpommin kuin koskaan aikaisemmin tunkeutuen täten heidän yksityisyytensä alueelle. On oletettu, että turvallisuus ja yksityisyys videovalvonnassa on nollasummapeliä, jossa kansalaisten on valittava yksityisyyden ja turvallisuuden välillä. Tämä tutkimus perustuu olettamukseen, että edellä esitetty ei pidä paikkaansa, vaan että on mahdollista suojata yksityisyys samalla taaten täysi turvallisuus. Ratkaisua tähän ongelmaan etsittiin suunnittelutieteellisen tutkimuksen avulla. Työssä suunniteltiin ja toteutettiin videovalvontajärjestelmä PEVS (Privacy Enhancing Video Surveillance system), joka suojaa valvonnanalaisten sivullisten yksityisyyttä ja siitä huolimatta tuottaa korkean turvallisuustason.. PEVS suojaa henkilöiden yksityisyyttä salaamalla automaattisesti videoaineistosta ne kuva-alat, joissa esiintyy ihmisiä. Mikäli laitonta toimintaa havaittaisiin, olisi riittävillä käyttöoikeuksilla mahdollista purkaa salaus mielenkiinnon kohteena olevien henkilöiden kohdalta tilanteen analysoimiseksi. Tämä mahdollisti yhtäältä puuttumattomuuden sivullisten yksityisyyteen ja toisaalta tiedon käyttämisen todistusaineistona mahdollisen rikoksen tutkimisessa. Tällä järjestelmällä yksityisyys oli mahdollista suojata samanaikaisesti, kun turvallisuudesta huolehdittiin. PEVS mahdollisti ensimmäistä kertaa maailmassa videovalvonnan, joka näyttää vain relevantit henkilöt jättäen muiden henkilöllisyyden paljastamatta. Sen takia tämän tutkimuksen merkittävin kontribuutio oli uudenlaisen lähestymistavan kehittäminen videovalvontaan, joka kykenee valikoivasti suojelemaan ihmisten yksityisyyttä. Tämä ratkaisu sisältää yksityisyyden suojaavan, useita rakenneosia sisältävän videovalvontajärjestelmäarkkitehtuurin esittelyn. Rakenneosiin kuuluu yksityisen tiedon tallennusmenetelmiä ja varjontunnistus- ja segmentointimetodeja, jotka paransivat aiemmin käytettyjen metodien tarkkuutta ja nopeutta. Lisäksi esiteltiin uudenlainen turvallisuus- ja yksityisyysmetriikka videovalvonnalle. Toteutettu järjestelmä on huomattava lisäys nykytietämykseen, jossa yksityisyyden suojan osalta on otettu vasta ensiaskelia ja joka ei mahdollista kattavaa järjestelmää
Chaudhari, Jayashri S. „Privacy Protection for Life-log System“. UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/491.
Der volle Inhalt der QuelleAjam, Nabil. „Privacy protection for location-based services“. Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0124.
Der volle Inhalt der QuelleIn this dissertation, we propose the expression and the modelling of the most important principles of privacy. We deduce the relevant privacy requirements that should be integrated in existing security policy models, such as RBAC models. We suggest the application of a unique model for both access control and privacy requirements. Thus, an access control model is to be enriched with new access constraints and parameters, namely the privacy contexts, which should implement the consent and the notification concepts. For this purpose, we introduce the privacy-aware Organisation role Based Access Control (OrBAC) model. The administration of this new model is significantly different from previous models. Three cases are identified. First, the privacy policy may be defined by the data collector but data owners have the possibility to set their preferences through a contracted Service Level Agreement (SLA). Second, the administration model allows legal organisations, for legal purposes, to impose their needs by bypassing user's preferences. Third, we present the case of a privacy policy which is negotiated between the data collector and the requestor based on user's preferences, defined in the SLA. Overall, our proposal is a distributed administration of privacy policies. Focusing on Location Based Services (LBSs), we finally propose a complete privacy framework ready to be deployed in information systems. We use the model prototype to adapt our solution to cellular networks when the requesters are the service providers. This prototype uses parlay gateways with web services. We also extend the set of Parlay X gateway standardised web services by proposing a dedicated privacy web service to enforce privacy protection
Du, Jing. „Privacy protection in location-based applications“. HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/816.
Der volle Inhalt der QuelleXiao, Dongqing. „Towards Graph Analytic and Privacy Protection“. Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-dissertations/545.
Der volle Inhalt der QuelleBERTOLAJA, LETIZIA. „LOCATION SHARING: PRIVACY THREATS AND PROTECTION“. Doctoral thesis, Università degli Studi di Milano, 2015. http://hdl.handle.net/2434/265334.
Der volle Inhalt der QuelleSchreiber, Renate Ingeborg. „Privacy protection in geographic information systems : guidelines for the protection of privacy in GIS in South Africa“. Master's thesis, University of Cape Town, 1998. http://hdl.handle.net/11427/16086.
Der volle Inhalt der QuellePersonal privacy issues are relevant to the GIS community. The distribution and dissemination of personal data is greatly facilitated through GIS tools. The use of these tools has been expanded from traditionally geographical operations to applications in geodemographics, and it is particularly in geodemographics where the protection of privacy becomes an issue. This thesis examines existing privacy protection guidelines put forward by international commercial and governmental sectors; the current international position with regards to the protection of privacy is reviewed, and South African legislation pertaining to these issues is explored. On this basis, a set of privacy protection guidelines is developed which can assist GIS managers in South Africa in ensuring that data collection and management do not infringe on personal privacy.
Pérez-Martínez, Pablo Alejandro. „Contributions to privacy protection for ubiquitous computing“. Doctoral thesis, Universitat Rovira i Virgili, 2015. http://hdl.handle.net/10803/334398.
Der volle Inhalt der QuelleEl desarrollo de nuevas tecnologías ha introducido el concepto de Computación Ubicua , en donde los objetos que nos rodean pueden tener procesadores integrados y establecer la comunicación con otros sistemas, con el fin de ofrecer servicios personalizados para ayudarnos con nuestras tareas habituales. Sin embargo, debido a que es posible tener ordenadores en casi cualquier lugar u objeto, esto ha abierto nuevas discusiones sobre temas tales como la privacidad y la seguridad, considerado desde diferentes puntos de vista, como el desarrollos jurídicos, sociales, económicos y tecnológicos, con una importancia cada vez mayor en el mundo actual. En esta tesis discutimos y analizamos algunas de las principales cuestiones de seguridad y privacidad en las tecnologías actuales, tales como teléfonos inteligentes, dispositivos RFID o ciudades inteligentes, y proponemos algunos protocolos para hacer frente a estos temas garantizando la privacidad de los usuarios en todo momento.
The development of new technologies has introduced the concept of Ubiquitous Computing, whereby the objects around us can have an embedded computer and establish communications with each other, in order to provide personalized services to assist with our tasks. However, because it is possible to have computers almost anywhere and within any object, this has opened up new discussions on issues such as privacy and security, considered from many different views, such as the legal, social, economic and technological development perspectives, all taking an increasingly significant importance in today’s world. In this dissertation we discuss and analyze some of the main privacy and security issues in current technologies, such as smartphones, RFIDs or smart cities, and we propose some protocols in order to face these issues guarantying users' privacy anytime.
Hedefine, Eeva Kaarina. „Personal Privacy Protection within Pervasive RFID Environments“. Fogler Library, University of Maine, 2006. http://www.library.umaine.edu/theses/pdf/HedefineEK2006.pdf.
Der volle Inhalt der QuelleLaufer, Deanna (Deanna Raquel). „Radio Frequency Identification : regulating information privacy protection“. Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41767.
Der volle Inhalt der QuelleIncludes bibliographical references (p. 82-87).
As applications of Radio Frequency Identification (RFID) become more profuse, the technology itself is stirring up some controversy. Due to its potential for amassing large amounts of information about both people and things, and the possibility of using the information for marketing, tracking, or even spying, numerous consumer groups are spearheading efforts to ensure that RFID does not breach their privacy rights. While there are some privacy laws regulating specific aspects of commerce, there are no laws which currently apply to the collection and use of information as it pertains to RFID. This lack of formal regulation allows companies to legally engage in practices which may encroach on consumers' privacy. However, RFID has the potential to optimize supply chain practices as well as provide other benefits to both consumers and businesses. As RFID use becomes more widespread, regulatory strategies should be considered to protect consumers' right to privacy while obtaining the benefits of using the technology. This thesis explores consumer and industry opinion of RFID through a customized survey. Results of the survey found that consumer and industry opinion are similar in many aspects, especially in the concern for protecting privacy and the desire for a regulatory mechanism to enforce those privacy rights. This thesis addresses the question of whether market-based solutions, self-regulation, or government regulation is the best option for addressing consumers' legitimate concerns of privacy while allowing businesses to reap the benefits of using the technology.
(cont.) The regulatory options are compared and then discussed based on the needs of consumers and industry members as determined by the survey. Finally, four recommendations are suggested to provide guidance for ensuring a positive acceptance of RFID while acknowledging the privacy rights of consumers.
by Deanna R. Laufer.
S.M.
Chen, Zhuo. „Towards practical location systems with privacy protection“. HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/218.
Der volle Inhalt der QuelleAlemany, Bordera José. „Measures of Privacy Protection on Social Environments“. Doctoral thesis, Universitat Politècnica de València, 2020. http://hdl.handle.net/10251/151456.
Der volle Inhalt der Quelle[ES] En la actualidad, las redes sociales se han convertido en un fenómeno cultural dominante para millones de usuarios de Internet. Las redes sociales son un entorno ideal para la generación de todo tipo de beneficios sociales para los usuarios. Los usuarios comparten experiencias, mantienen el contacto con sus familiares, amigos y conocidos, y obtienen beneficios económicos gracias al poder de su influencia (lo que se traduce en nuevas oportunidades de trabajo). Sin embargo, el uso de las redes sociales y la acción de compartir información implica la perdida de la privacidad de los usuarios. Recientemente ha emergido un gran interés en proteger la privacidad de los usuarios. Esta situación se ha debido a los casos de arrepentimientos documentados en las acciones de los usuarios, escándalos empresariales producidos por usos indebidos de la información personal, y a los sesgos que introducen los mecanismos de privacidad. Los proveedores de redes sociales han incluido mejoras en sus sistemas para reducir los riesgos en privacidad de los usuarios; por ejemplo, restringiendo las políticas de privacidad por defecto, añadiendo nuevos elementos de configuración de la privacidad, y diseñando accesos fáciles y directos para configurar la privacidad de los usuarios. En el campo de la investigación de la privacidad, nuevos avances se proponen para mejorar los mecanismos de privacidad la mayoría centrados en la automatización, selección de grano fino, y uso de características extraídas de la información y sus interacciones para recomendar la mejor política de privacidad para el usuario. A pesar de estos avances, muchos estudios han demostrado que la preocupación de los usuarios por la privacidad no se corresponde con las decisiones que finalmente toman en las redes sociales. Este desajuste en el comportamiento de los usuarios podría deberse a la complejidad del propio concepto de privacidad. Este inconveniente hace que los usuarios ignoren los riesgos de privacidad, o los perciban como temporalmente distantes. Otra causa del desajuste en el comportamiento de los usuarios podría deberse a la complejidad del proceso de toma de decisiones sobre la privacidad. Esto se debe a que los usuarios deben considerar todos los escenarios posibles y los factores involucrados (por ejemplo, el número de amigos, el tipo de relación, el contexto de la información, etc.) para tomar una decisión apropiada sobre la privacidad. Las principales contribuciones de esta tesis son el desarrollo de métricas para evaluar los riesgos de privacidad, y la propuesta de mecanismos de privacidad explicables (haciendo uso de las métricas desarrolladas) para asistir y concienciar a los usuarios durante el proceso de decisión sobre la privacidad. Atendiendo a la definición del concepto de la privacidad, las dimensiones del alcance de la información y la sensibilidad de la información se han considerado en esta tesis para evaluar los riesgos de privacidad. En cuanto a los mecanismos de privacidad explicables, se han diseñado utilizando técnicas de paternalismo blando y elementos de gamificación que hacen uso de las métricas propuestas. Estos mecanismos se han integrado en la red social PESEDIA y evaluado en experimentos con usuarios reales. PESEDIA es una red social desarrollada en el marco de la tesina de Master del doctorando [15], esta tesis y los proyectos nacionales “Privacidad en Entornos Sociales Educativos durante la Infancia y la Adolescencia” (TIN2014-55206-R) y “Agentes inteligentes para asesorar en privacidad en redes sociales” (TIN2017-89156-R). Los resultados confirman la validez de las métricas propuestas para calcular el alcance de los usuarios y la sensibilidad de las publicaciones de las redes sociales. En cuanto a la métrica del alcance, los resultados también mostraron la posibilidad de estimarla mediante métricas de centralidad local y social para escenarios con acceso limitado a la información. En cuanto a la métrica de sensibilidad, los resultados también pusieron de manifiesto la falta de concordancia de los usuarios en el caso de algunos tipos de información y el consenso en el caso de la mayoría de ellos. El uso de estas métricas como parte de los mensajes sobre las posibles consecuencias de las opciones de política de privacidad y las acciones de intercambio de información a los usuarios mostró efectos positivos en el comportamiento de los usuarios con respecto a la privacidad. Además, los resultados de la exploración de la compensación de los usuarios entre los costos y los beneficios durante las acciones de divulgación de información personal mostraron relaciones significativas con los círculos sociales habituales (familiares, amigos, compañeros de trabajo y usuarios desconocidos) y sus propiedades. Esto permitió diseñar mejores mecanismos de privacidad que restringen adecuadamente el acceso a la información y reducen los arrepentimientos. Por último, los elementos de gamificación aplicados a las redes sociales y a la privacidad de los usuarios mostraron un efecto positivo en el comportamiento de los usuarios hacia la privacidad y las prácticas seguras en las redes sociales.
[CA] En l’actualitat, les xarxes socials s’han convertit en un fenomen cultural dominant per a milions d’usuaris d’Internet. Les xarxes socials són un entorn ideal per a la generació de tota mena de beneficis socials per als usuaris. Els usuaris comparteixen experiències, mantenen el contacte amb els seus familiars, amics i coneguts, i obtenen beneficis econòmics gràcies al poder de la seva influència (el que es tradueix en noves oportunitats de treball). No obstant això, l’ús de les xarxes socials i l’acció de compartir informació implica la perduda de la privacitat dels usuaris. Recentment ha emergit un gran interès per protegir la privacitat dels usuaris. Aquesta situació s’ha degut als casos de penediments documentats en les accions dels usuaris, escàndols empresarials produïts per usos indeguts de la informació personal, i als caires que introdueixen els mecanismes de privacitat. Els proveïdors de xarxes socials han inclòs millores en els seus sistemes per a reduir els riscos en privacitat dels usuaris; per exemple, restringint les polítiques de privacitat per defecte, afegint nous elements de configuració de la privacitat, i dissenyant accessos fàcils i directes per a configurar la privacitat dels usuaris. En el camp de la recerca de la privacitat, nous avanços es proposen per a millorar els mecanismes de privacitat la majoria centrats en l’automatització, selecció de gra fi, i ús de característiques extretes de la informació i les seues interaccions per a recomanar la millor política de privacitat per a l’usuari. Malgrat aquests avanços, molts estudis han demostrat que la preocupació dels usuaris per la privacitat no es correspon amb les decisions que finalment prenen en les xarxes socials. Aquesta desalineació en el comportament dels usuaris podria deure’s a la complexitat del propi concepte de privacitat. Aquest inconvenient fa que els usuaris ignorin els riscos de privacitat, o els percebin com temporalment distants. Una altra causa de la desalineació en el comportament dels usuaris podria deure’s a la complexitat del procés de presa de decisions sobre la privacitat. Això es deu al fet que els usuaris han de considerar tots els escenaris possibles i els factors involucrats (per exemple, el nombre d’amics, el tipus de relació, el context de la informació, etc.) per a prendre una decisió apropiada sobre la privacitat. Les principals contribucions d’aquesta tesi són el desenvolupament de mètriques per a avaluar els riscos de privacitat, i la proposta de mecanismes de privacitat explicables (fent ús de les mètriques desenvolupades) per a assistir i conscienciar als usuaris durant el procés de decisió sobre la privacitat. Atesa la definició del concepte de la privacitat, les dimensions de l’abast de la informació i la sensibilitat de la informació s’han considerat en aquesta tesi per a avaluar els riscos de privacitat. Respecte als mecanismes de privacitat explicables, aquests s’han dissenyat utilitzant tècniques de paternalisme bla i elements de gamificació que fan ús de les mètriques propostes. Aquests mecanismes s’han integrat en la xarxa social PESEDIA i avaluat en experiments amb usuaris reals. PESEDIA és una xarxa social desenvolupada en el marc de la tesina de Màster del doctorant [15], aquesta tesi i els projectes nacionals “Privacitat en Entorns Socials Educatius durant la Infància i l’Adolescència” (TIN2014-55206-R) i “Agents Intel·ligents per a assessorar en Privacitat en xarxes socials” (TIN2017-89156-R). Els resultats confirmen la validesa de les mètriques propostes per a calcular l’abast de les accions dels usuaris i la sensibilitat de les publicacions de les xarxes socials. Respecte a la mètrica de l’abast, els resultats també van mostrar la possibilitat d’estimarla mitjançant mètriques de centralitat local i social per a escenaris amb accés limitat a la informació. Respecte a la mètrica de sensibilitat, els resultats també van posar de manifest la falta de concordança dels usuaris en el cas d’alguns tipus d’informació i el consens en el cas de la majoria d’ells. L’ús d’aquestes mètriques com a part dels missatges sobre les possibles conseqüències de les opcions de política de privacitat i les accions d’intercanvi d’informació als usuaris va mostrar efectes positius en el comportament dels usuaris respecte a la privacitat. A més, els resultats de l’exploració de la compensació dels usuaris entre els costos i els beneficis durant les accions de divulgació d’informació personal van mostrar relacions significatives amb els cercles socials habituals (familiars, amics, companys de treball i usuaris desconeguts) i les seves propietats. Això ha permés dissenyar millors mecanismes de privacitat que restringeixen adequadament l’accés a la informació i redueixen els penediments. Finalment, els elements de gamificació aplicats a les xarxes socials i a la privacitat dels usuaris van mostrar un efecte positiu en el comportament dels usuaris cap a la privacitat i les pràctiques segures en les xarxes socials.
Alemany Bordera, J. (2020). Measures of Privacy Protection on Social Environments [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/151456
TESIS
Frik, Alisa. „Economics of Privacy: Users’ Attitudes and Economic Impact of Information Privacy Protection“. Doctoral thesis, Università degli studi di Trento, 2017. https://hdl.handle.net/11572/368319.
Der volle Inhalt der QuelleFrik, Alisa. „Economics of Privacy: Users' Attitudes and Economic Impact of Information Privacy Protection“. Doctoral thesis, University of Trento, 2017. http://eprints-phd.biblio.unitn.it/2025/1/Frik_Alisa_Thesis.pdf.
Der volle Inhalt der QuelleMasmoudi, Souha. „Malleable privacy-enhancing-technologies for privacy-preserving identity management systems“. Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS023.
Der volle Inhalt der QuelleDigital identities are, nowadays, used at a large scale (i.e., in public services, social medias, at work, online shopping, etc.). This brings usability issues as users are constrained to deal with multiple identities and attributes for access control and data sharing objectives. In addition, security and privacy challenges have arisen as the interacting entities, those that issue, process and collect these identities can, due to their behavior or security deficiencies, lead to identity theft, massive data collection and tracking of users' behaviors on the Internet.This thesis aims at finding the best trade-off between security, privacy and usability for identity management systems, based on cryptographic primitives. The first two contributions focus on identity management for access control and consider real identities and attributes that contain personal (e.g., age) and sensitive (e.g., biometric traits) information.The first contribution proposes a user-centric and privacy-preserving identity management system in which users keep control over their attributes. A user, that receives attributes certified by an identity provider, is able to interact, in a pseudonymized manner, with a service provider and prove the authenticity of the provided attributes while ensuring that he discloses only the minimum number of attributes. This solution is based on a new malleable signature scheme that allows users to modify the certificate issued by the identity provider on his attributes in a restricted and controlled manner. It also preserves privacy by satisfying the unlinkability property between curious service providers that try to link different transactions to the same user.The second contribution presents a new biometric authentication scheme that offers robustness and privacy guarantees. Three steps are required. First, the user physically visits the identity provider that pushes an encrypted and certified biometric template onto his smartphone. Then he remotely enrolls at a service provider, in an anonymous manner. Finally, he authenticates offline to the service provider that captures a new biometric template in order to be locally verified via the smartphone. By relying on malleable signatures, the proposed solution prevents the use of fake biometric identities and guarantees the authentication soundness. Unlinkability and anonymity are also preserved.The third contribution provides a solution to meet the need of data sharing in an identity management system. In particular, it studies the management of users ephemeral attributes in the context of proximity tracing for e-healthcare systems. The proposed solution ensures data consistency and integrity and preserves the privacy of users who share their contact information with people in proximity. Alerts are issued to users who have been in contact with infected persons. The use of a hybrid architecture, which relies on a centralized server and decentralized proxies, allows to prevent malicious users from injecting false alerts, and to prevent the linkability of contact information to the same user and the re-identification of users involved in contact with an infected person
Holmstrup, Mark A. „Privacy protection standards for the information sharing environment“. Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FHolmstrup.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Bergin, Richard D. ; Josefek, Robert A. "September 2009." Description based on title screen as viewed on November 9, 2009. Author(s) subject terms: Information Sharing Environment, privacy, collaboration, constitutionality, Transportation Security Administration, Program Manager Information Sharing Environment, information sharing. Includes bibliographical references (p. 89-96). Also available in print.
Bhaduri, Anuket. „User Controlled Privacy Protection in Location-Based Services“. Fogler Library, University of Maine, 2003. http://www.library.umaine.edu/theses/pdf/BhaduriA2003.pdf.
Der volle Inhalt der QuelleLam, Wai-hong, und 林偉雄. „Review on effectiveness of policy on privacy protection“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B46757740.
Der volle Inhalt der QuelleLoukides, Grigorios. „Data utility and privacy protection in data publishing“. Thesis, Cardiff University, 2008. http://orca.cf.ac.uk/54743/.
Der volle Inhalt der QuelleMaouche, Mohamed. „Protection against re-identification attacks in location privacy“. Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI089.
Der volle Inhalt der QuelleWith the wide propagation of handheld devices, more and more mobile sensors are being used by end users on a daily basis. Those sensors could be leveraged to gather useful mobility data for city planners, business analysts and researches. However, gathering and exploiting mobility data raises many privacy threats. Sensitive information such as one’s home or workplace, hobbies, religious beliefs, political or sexual preferences can be inferred from the gathered data. In the last decade, Location Privacy Protection Mechanisms (LPPMs) have been proposed to protect user data privacy. They alter data mobility to enforce formal guarantees (e.g., k-anonymity or differential privacy), hide sensitive information (e.g., erase points of interests) or act as countermeasures for particular attacks. In this thesis, we focus on the threat of re-identification which aims at re-linking an anonymous mobility trace to the know past mobility of its user. First, we propose re-identification attacks (AP-Attack and ILL-Attack) that find vulnerabilities and stress current state-of-the-art LPPMs to quantify their effectiveness. We also propose a new protection mechanism HMC that uses heat maps to guide the transformation of mobility data to change the behaviour of a user, in order to make her look similar to someone else rather than her past self which preserves her from re-identification attacks. This alteration of mobility trace is constrained with the control of the utility of the data to minimize the distortion in the quality of the analysis realized on this data
Andonie, Luisa. „Whistleblower protection programs compromise the reported taxpayer's privacy“. Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-224035.
Der volle Inhalt der QuelleFatema, Kaniz. „Adding privacy protection to policy based authorisation systems“. Thesis, University of Kent, 2013. https://kar.kent.ac.uk/47905/.
Der volle Inhalt der QuelleLABATI, R. DONIDA. „CONTACTLESS FINGERPRINT BIOMETRICS: ACQUISITION, PROCESSING, AND PRIVACY PROTECTION“. Doctoral thesis, Università degli Studi di Milano, 2013. http://hdl.handle.net/2434/217562.
Der volle Inhalt der QuelleAdams, Anne Lorraine. „Users' perceptions of privacy in multimedia communications“. Thesis, University College London (University of London), 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.248208.
Der volle Inhalt der QuelleNwozo, Jacqueline Nonye. „The corporation and privacy protection : ought English law to be further developed to provide fuller protection for the privacy of the corporation?“ Thesis, King's College London (University of London), 2015. http://kclpure.kcl.ac.uk/portal/en/theses/the-corporation-and-privacy-protection(424eb786-e5a0-4086-bb28-0c59cac7f12c).html.
Der volle Inhalt der QuelleParra, Arnau Javier. „Privacy protection of user profiles in personalized information systems“. Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/144937.
Der volle Inhalt der QuelleVera, del Campo Juan. „Contributions to security and privacy protection in recommendation systems“. Doctoral thesis, Universitat Politècnica de Catalunya, 2012. http://hdl.handle.net/10803/113673.
Der volle Inhalt der QuelleEste documento explora c omo localizar documentos interesantes para el usuario en grandes redes distribuidas mediante el uso de sistemas de recomendaci on. Se de fine un sistema de recomendaci on como un sistema autom atico que, dado un modelo de cliente y un conjunto de documentos disponibles, es capaz de seleccionar y ofrecer los documentos que son m as interesantes para el cliente. Las caracter sticas deseables de un sistema de recomendaci on son: (i) ser r apido, (ii) distribuido y (iii) seguro. Un sistema de recomendaci on r apido mejora la experiencia de compra del cliente, ya que una recomendaci on no es util si es que llega demasiado tarde. Un sistema de recomendaci on distribuido evita la creaci on de bases de datos centralizadas con informaci on sensible y mejora la disponibilidad de los documentos. Por ultimo, un sistema de recomendaci on seguro protege a todos los participantes del sistema: usuarios, proveedores de contenido, recomendadores y nodos intermedios. Desde el punto de vista de la seguridad, existen dos problemas principales a los que se deben enfrentar los sistemas de recomendaci on: (i) la protecci on de la intimidad de los usuarios y (ii) la protecci on de los dem as participantes del proceso de recomendaci on. Los recomendadores son capaces de emitir recomendaciones personalizadas teniendo en cuenta no s olo el per l de los documentos, sino tambi en a la informaci on privada que los clientes env an al recomendador. Por tanto, los per les de usuario incluyen informaci on personal y altamente sensible, como sus gustos y fobias. Con el n de desarrollar un sistema de recomendaci on util y mejorar su e cacia, creemos que los usuarios no deben tener miedo a la hora de expresar sus preferencias. Para ello, la informaci on personal que est a incluida en los per les de usuario debe ser protegida y la privacidad del usuario garantizada. El segundo desafi o desde el punto de vista de la seguridad implica un nuevo tipo de ataque. Dado que la prevenci on de la distribuci on ilegal de documentos con derechos de autor por medio de soluciones t ecnicas no ha sido efi caz, los titulares de derechos de autor cambiaron sus objetivos para atacar a los proveedores de documentos y cualquier otro participante que ayude en el proceso de distribuci on de documentos. Adem as, tratados y leyes como ACTA, la ley SOPA de EEUU o la ley "Sinde-Wert" en España ponen de manfi esto el inter es de los estados de todo el mundo para controlar y procesar a estos nodos intermedios. Los juicios recientes como MegaUpload, PirateBay o el caso contra el Sr. Pablo Soto en España muestran que estas amenazas son una realidad.
Ophoff, Jacobus Albertus. „WSP3: a web service model for personal privacy protection“. Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/272.
Der volle Inhalt der QuelleSweeney, Latanya. „Computational disclosure control : a primer on data privacy protection“. Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/8589.
Der volle Inhalt der QuelleIncludes bibliographical references (leaves 213-216) and index.
Today's globally networked society places great demand on the dissemination and sharing of person specific data for many new and exciting uses. When these data are linked together, they provide an electronic shadow of a person or organization that is as identifying and personal as a fingerprint even when the information contains no explicit identifiers, such as name and phone number. Other distinctive data, such as birth date and ZIP code, often combine uniquely and can be linked to publicly available information to re-identify individuals. Producing anonymous data that remains specific enough to be useful is often a very difficult task and practice today tends to either incorrectly believe confidentiality is maintained when it is not or produces data that are practically useless. The goal of the work presented in this book is to explore computational techniques for releasing useful information in such a way that the identity of any individual or entity contained in data cannot be recognized while the data remain practically useful. I begin by demonstrating ways to learn information about entities from publicly available information. I then provide a formal framework for reasoning about disclosure control and the ability to infer the identities of entities contained within the data. I formally define and present null-map, k-map and wrong-map as models of protection. Each model provides protection by ensuring that released information maps to no, k or incorrect entities, respectively. The book ends by examining four computational systems that attempt to maintain privacy while releasing electronic information. These systems are: (1) my Scrub System, which locates personally-identifying information in letters between doctors and notes written by clinicians; (2) my Datafly II System, which generalizes and suppresses values in field-structured data sets; (3) Statistics Netherlands' pt-Argus System, which is becoming a European standard for producing public-use data; and, (4) my k-Similar algorithm, which finds optimal solutions such that data are minimally distorted while still providing adequate protection. By introducing anonymity and quality metrics, I show that Datafly II can overprotect data, Scrub and p-Argus can fail to provide adequate protection, but k-similar finds optimal results.
by Latanya Sweeney.
Ph.D.
Xu, Qiongkai. „Privacy Protection in Conversations“. Phd thesis, 2022. http://hdl.handle.net/1885/266428.
Der volle Inhalt der QuelleLin, Yi-Chun, und 林怡君. „liability insurance of privacy protection“. Thesis, 2014. http://ndltd.ncl.edu.tw/handle/23915608440347085771.
Der volle Inhalt der Quelle國立臺灣大學
科際整合法律學研究所
102
Abstract Since the enactment of the Personal information Protection Act, enterprises have been facing potential risks of civil claims for damages. In addition to the authentication approach to examine conformity to the requirements by the Act, enterprises are also taking insurance measures to transfer the risks. As a result, demands on liability insurance of privacy protection come into being. This paper attempts to analyze the issues brought about by this new type of insurance, and tries to use the substantive law, procedural law, and pro forma contract approach to find solutions and build proposals. Firstly, this is a liability insurance, and therefore its insurance coverage is with the nature of recurrence, continuity, and potentiality. To insurer, this type of insurance incidences is prone to long-tail responsibilities. This problem should be handled with the insurance coverage design. Furthermore, the indemnification liability needs to go through litigation proceedings for verdict, and due to the domestic Insurance Law, Article 65, Item 3,this requirement can easily get the insured trapped in the statute of time limitations. Therefore, this problem needs to be solved by way of the procedural law and contract approach as well as law amendment. Secondly, what damages should be covered by the liability insurance of privacy protection responsibility? This paper divides the coverage into two parts: indemnification coverage amount and other relevant legal fees. Chapter 4 deals with the insured’s internal management staff, employees, and outsource contractors for their deliberate or negligent behaviors that cause data leakage incidences, and discusses whether these affiliates need to pay for the insurance and whether they are entitled for subrogation. Chapter 5 discusses the Double Insurance between the coexistent liability insurance of privacy protection and other insurances, and how they should be handled. Hopefully, the discourse presented in this paper can offer the public institutions and private enterprises some references in underwriting or insuring the liability insurance of privacy protection. Moreover, the author hopes that this paper can be a useful reference for the domestic insurance companies in their insurance design.
Poettering, Bertram. „Privacy Protection for Authentication Protocols“. Phd thesis, 2012. http://tuprints.ulb.tu-darmstadt.de/2867/1/thesis.pdf.
Der volle Inhalt der QuelleLiu, Yao-Yuan, und 劉耀元. „RFID Security and Privacy Protection“. Thesis, 2007. http://ndltd.ncl.edu.tw/handle/96435613802289654121.
Der volle Inhalt der Quelle明新科技大學
資訊管理研究所
95
Interests continue to grow in recent years for the adoption of Radio Frequency Identification (RFID) in many different areas including transportation and supply chain management. Those RFID-included objects can be targeted more efficiently by real-time tracking and instant management. However, because of the contact-less type of RFID remote retrieval, the transmission of data in the air is very vulnerable to eavesdropping or appropriation. A primary security concern surrounding RFID technology is the illicit tracking of consumer location and analyzing of their shopping habits or behavior. Recently, there are many solutions are proposed for RFID security, but each solution has pros and cons. This research will propose two protocols to lower the cost and enhance the security. Besides, most of the existing solutions assume the channel between RFID reader and the back-end database is secure, for it is structured in the wired environment of enterprise’s interior. However, nowadays the wireless portable RFID readers are widely used to connect back-end databases. Therefore, this research will also propose a lightweight secure protocol without the assumption.
Cao, Ming. „Privacy Protection on RFID Data Publishing“. Thesis, 2009. http://spectrum.library.concordia.ca/976641/1/MR63109.pdf.
Der volle Inhalt der QuelleChen, I.-Ju, und 陳以儒. „The Study of Internet Privacy Protection“. Thesis, 2001. http://ndltd.ncl.edu.tw/handle/69804204587407894648.
Der volle Inhalt der QuelleChen, Yi-Jie, und 陳羿傑. „Privacy Information Protection through Data Anonymization“. Thesis, 2015. http://ndltd.ncl.edu.tw/handle/3bpp9z.
Der volle Inhalt der Quelle中原大學
資訊工程研究所
103
Mobile apps is moving power behind the prevalence of intelligent mobile devices, which, in turn, bring in the exponentially growing number of mobile apps being developed. The personalized and ubiquitous characteristics of intelligent mobile devices, with the added variety of record taking and data sensing capabilities become a serious threat to user privacy when linked with the communication ability of the mobile devices. How to allow us to enjoy all the conveniences and services without privacy risk is an important issue to all users of mobile devices. The available privacy protection schemes or methods either require change made at the mobile device system framework and core, or require complicate technology process and skill. In this thesis, we proposed a proxy server based approach to develop a solution practical to ordinary users. A prototype has been implemented to demonstrate the practicality and usability of the privacy protection mechanism.
Peng, Jian-Ren, und 彭建仁. „Security and Privacy Protection for Bluetooth“. Thesis, 2008. http://ndltd.ncl.edu.tw/handle/65814659365191496151.
Der volle Inhalt der Quelle明新科技大學
資訊管理研究所
96
Bluetooth, a short range wireless communication standard, has made possible a number of digital devices totally free from being bonded to wires and cables. It’s application which used to serve mostly cell phones and headsets has widely extended to PCs and PDAs. Given the data transferred has come to a greater degree of sensitivity, security issues involving Bluetooth transmission have raised many concerns. However, during the authentication and key exchange process of Bluetooth communication, a lot of information is transferred in plaintext, which allows a malicious third party to spoof the legal Bluetooth device to make it through the authentication, or to deduce the encryption key to eavesdrop the transferring data. The revised version of standard, Bluetooth V2.1, came forth in 2007 with a new security mechanism, Secure Simple Pairing, which seemly eradicated the problems legacy pairing had missed out such as spoofing attacks and eavesdropping attacks. However, as authentication is done by visual confirming on displayed 6-digit numbers to avoid man-in-the-middle attacks, there are quite a few instances of user error that will result in security and privacy breaches. This paper will introduce and analyze the security mechanism of Bluetooth first, then discuss the security drawbacks on this mechanism, and finally an improved scheme is proposed that could be applied in high security demanding applications.
吳建宏. „RFID Security Protocols with Privacy Protection“. Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41594090730400426797.
Der volle Inhalt der Quelle明新科技大學
資訊管理研究所
97
As the Radio Frequency Identification technology progresses and cost decreases, the enterprises induct RFID to enhance the operational efficiency of enterprises. RFID has thus been widely used in many domains, such as supply chain, access control, transportation tickets, automatic toll collection, livestock management and contactless credit cards etc. As its cost declines and function extends, RFID is anticipated to be widely used in our daily life. However, the transmission of data in the air is vulnerable to eavesdrop-ping, interruption, or modification. Adversaries may use the illegal reader to violate the privacy or trace the position of users. On top of this, its prevalence has brought the stress on its security and privacy issues. Therefore, privacy protection will become a major topic of RFID in the near future. Many RFID security mechanisms for privacy protection have been proposed in re-cent years. Those mechanisms can be categorized into two types: pseudonyms, and shared secret update. However, most of those mechanisms assume the channel between the reader to the server is secure. And a large number of complex computations are needed. Moreover, some of those mechanisms can not prevent replay and denial of ser-vice attacks. This study aims to discuss the privacy protection of RFID, analyze the existing se-curity mechanisms and propose an improved protocol to effectively promote RFID se-curity, allowing consumers to enjoy the technological convenience brought by RFID.
Huang, Li-Ang, und 黃立昂. „The Privacy Protection On Electronic Commerce“. Thesis, 2009. http://ndltd.ncl.edu.tw/handle/28891450560454702968.
Der volle Inhalt der Quelle東吳大學
法律學系
97
As the Internet is becoming widely used and the number of users is growing everyday, the Internet has already become a part of human life. However, as the uncertainty of the electronic commerce is higher than that of the physical store, also the qualities of goods vary from stores to stores on the Internet, and due to attacks by hackers, fraud, faked cards, personal information leakage and other adverse news report about the Internet, secure transaction has thus become a very important issue. It is necessary that the government establishes a complete operation regulation of the Internet security, transaction mechanism and etc , so as to increase online transactions as well as the business opportunities of the electronic commerce. Only by providing a reliable and mutually unobstructed electronic commerce environment can we enhance our overall global competitiveness of the domestic industries. Hence, it is expected that this research proposes an effective solution for secure transactions, thus achieving gaining the consumers’ trust on internet and increasing the economic growth. This paper discusses the importance of the Internet security by investigating the types of information privacy violation. Recommendations on our current regulations are proposed based on the privacy regulation of Organization for Economic Cooperation and Development, APEC Electronic Commerce Steering Group, European Union, the United States, Japan and other countries, and the privacy protection mechanisms are discussed from the aspects of website disciplinary regulation, Sign-in seal, Trustmark and etc. In addition, with regard to the legislation of privacy protection of the B2C transaction by the government not being able to respond to the fast development of electronic commerce, this paper also proposes ways for individual consumers and the online shop owners to enhance the online transaction security, thus creating a double-win situation and increasing the overall competitiveness of Taiwan.
Silva, Paulo Miguel Guimarães da. „Data Privacy Protection for the Cloud“. Master's thesis, 2016. http://hdl.handle.net/10316/93238.
Der volle Inhalt der QuellePrivacy is for a long time a concern when data is being discussed. Nowadays, with an increasing amount of personal and confidential data being transmitted and stored online, data curators have to assure certain guarantees of data protection and privacy. This Master Dissertation presents a background of anonymization and concealing techniques. Their characteristics and capabilities are described, as well as tools to implement and evaluate anonymization and concealing. The evaluation of the applicability of the DNA-inspired concealing algorithm is the main objective of this work. Usually, various metrics are used to measure aspects like risk or utility of the anonymized data. This work presents a new approach of evaluating how well concealed is the data. By using the Cosine Similarity as a measure of similarity between the private and concealed data, this metric proves its worthiness not only in information retrieval or text mining applications but also in the analysis of concealed or anonymized files. Nowadays there is a continuously growing demand for Cloud services and storage. The evaluation in the Master Dissertation is directed to find how suitable is the application of the DNA-inspired concealing algorithm over the data being stored or transmitted in the Cloud. The evaluation is made by analyzing the concealing results as well as the performance of the algorithm itself. The application of the algorithm is made over various texts and audio files with different characteristics, like size or contents. However, both file types are unstructured data. Which is an advantage for being accepted as an input by the algorithm. Unlike many anonymization algorithms which demand structured data. With the final results and analysis, it will be possible to determine the applicability and performance of the referred algorithm for a possible integration with the Cloud.
Ko-Nan, Ai, und 艾克難. „Freedom of Information and Privacy Protection“. Thesis, 2010. http://ndltd.ncl.edu.tw/handle/70751897185941011178.
Der volle Inhalt der Quelle中國文化大學
法律學研究所
98
Chinese community in the long period of martial law martial pains, its development has become increasingly democratic, Right Protection of the public about their growing importance, the Government has also provided services to aspiration, to achieve this goal, government information is not public avoid the trend. Implementation of a public policy of any government, who must monitor citizen participation and rational, so the policy can meet the people expect. Freedom of information for the protection of the Constitution stipulates that freedom, negative freedom as a right, not only the protection of personal privacy violations, on the positive side, the right to freedom of information as a constitutional right to public freedom of information how to apply the right to promote the public welfare, use of information, create a fair, just and justice of the modern welfare state, the government can not evade responsibility. This paper tries to self-constitution, rule by law the principle of the viewpoint, of the Government Information Disclosure in administrative acts to the people the right to be protected, and analysis of Chinese government information public legal system, the development process and structure, and try on the current situation to be improved between recommendations and the letter On the Regulations on Open Government in China to receive his mountain effect. The thesis is divided into five chapters; the first chapter is an introduction, an overview of this research motivation, research methods, expected results of the study limitations and paper structure; second chapter of the Constitution to protect the basic rights of freedom of information, an overview of the Constitution Evolution and change, after the principles expounded the basic concepts of the rule of law country, gradually cut into the free flow of information to be explored; the third chapter of the conflict, information disclosure and privacy, the information outlined in our open system of germination, establishment of rule of law, the current situation, and with neighboring Japan open system of government information protection and privacy of a comparison; the fourth is an overview of the open system of cross-strait information and privacy protection compared with an overview of open government information in China the status of the legal system, and discusses its Open Government Information Ordinance Legislative History and local information in its public discourse whom the rule of law; fifth chapter is the conclusion and recommendations; this chapter as a summary of this thesis, the Chinese government information disclosure law a number of proposals to serve as a reference for future amendments.
SHIH, MING HSIEN, und 施明賢. „Privacy Protection of Cloud Computing Service“. Thesis, 2011. http://ndltd.ncl.edu.tw/handle/00352738377551801474.
Der volle Inhalt der Quelle國立清華大學
科技法律研究所
99
With the rapid development of information technology, on one hand, the daily life becomes more convenient; but on the other hand, it also brings about more complicated issues on the privacy and security than ever. Cloud computing service is not a brand new technology, but a new business service model. With the diversification of the cloud computing service applications, its impact on protection of personal privacy is more influential than any other technologies. The essay, through the interaction between privacy, security, information technology, will not only analyze the exclusivity, variability, right of self-determination, right of resistance, and property rights of information privacy, but also will explore the possible legal issues and risks which the cloud computing service may incur in terms of protection on information privacy. Meanwhile, based upon Safe Harbor framework, the essay will also study the gaps between the intentions of the service providers on privacy protection and legal mechanism. The output of the study will serve as a valuable reference for domestic service providers when elaborating and implementing privacy policies. Through the introduction of proper legal and auditing system, the dynamic balance between possible risks and technological development can be achieved. The privacy protection cannot run smoothly without following the frameworks of objective environment, laws and regulations, and reasonable privacy expectation. The essay also intends to propose feasible suggestions for the protection of information privacy in cloud computing service, which may be applied or related to the undergoing detailed regulations of Personal Data Protection Act.
Oberholzer, Hendrik Johannes. „A privacy protection model to support personal privacy in relational databases“. Thesis, 2008. http://hdl.handle.net/10210/507.
Der volle Inhalt der QuelleProf. M.S. Olivier
Zhang, Qing. „Microdata privacy protection through permutation-based approaches“. 2008. http://www.lib.ncsu.edu/theses/available/etd-03202008-123703/unrestricted/etd.pdf.
Der volle Inhalt der Quelle