Search for dissertations about: "data protection"
Showing result 16 - 20 of 546 swedish dissertations containing the words data protection.
-
16. Cryptographic Tools for Privacy Preservation and Verifiable Randomness
Abstract : Our society revolves around communication. The Internet is the biggest, cheapest and fastest digital communication channel used nowadays. Due to the continuous increase of daily communication among people worldwide, more and more data might be stolen, misused or tampered. READ MORE
-
17. Security Infrastructure and Applicationsfor Mobile Agents
Abstract : Research areas of this dissertation are security for mobile agents, for applications based on mobile agents, and for distributed network environments in which mobile agents execute. Mobile agents paradigm has captured researchers’ and industry’s interests long time ago because of its innovative capabilities and attractive applications. READ MORE
-
18. Privacy-guardian : the vital need in machine learning with big data
Abstract : Social Network Sites (SNS) such as Facebook and Twitter, play a great role in our lives. On one hand, they help to connect people who would not otherwise be connected. Many recent breakthroughs in AI such as facial recognition [Kow+18], were achieved thanks to the amount of available data on the Internet via SNS (hereafter Big Data). READ MORE
-
19. Towards Usable Transparency via Individualisation
Abstract : The General Data Protection Regulation grants data subjects the legal rights of transparency and intervenability. Ex post transparency provides users of data services with insight into how their personal data have been processed, and potentially clarifies what consequences will or may arise due to the processing of their data. READ MORE
-
20. Intrusion Detection and Protection of Application Servers
Abstract : The protection of application servers using intrusion detection andother related techniques is studied in this thesis. A thorough reviewis first made of taxonomies for intrusion detectionsystems (IDSs) and how these can help to understand the basicfunctionality and problems of intrusion detection. READ MORE