Search for dissertations about: "privacy by design"
Showing result 16 - 20 of 82 swedish dissertations containing the words privacy by design.
-
16. Discovering Constructs and Dimensions for Information Privacy Metrics
Abstract : Privacy is a fundamental human right. During the last decades, in the information age, information privacy has become one of the most essential aspects of privacy. Information privacy is concerned with protecting personal information pertaining to individuals. READ MORE
-
17. Privacy of Sudden Events in Cyber-Physical Systems
Abstract : Cyberattacks against critical infrastructures has been a growing problem for the past couple of years. These infrastructures are a particularly desirable target for adversaries, due to their vital importance in society. READ MORE
-
18. Security and Privacy of Sensitive Data in Cloud Computing
Abstract : Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility service, and it is revolutionizing many domains of computing. Compared with earlier methods of processing data, cloud computing environments provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. READ MORE
-
19. Design and Evaluation of Anonymity Solutions for Mobile Networks
Abstract : Internet and mobile communications have had a profound effect on today's society. New services are constantly being deployed, in which personal data are being processed in return for personally tailored services. While mobile networks lay the groundwork for new innovative services, at the same time they pose numerous privacy challenges. READ MORE
-
20. Privacy Analysis and Protocols for Decentralized Online Social Networks
Abstract : Decentralized Online Social Networks (DOSNs) are evolving as a promising approach to mitigate design-inherent privacy flaws of logically centralized services such as Facebook, Google+ or Twitter. Common approaches to implement a DOSN build upon a peer-to-peer (P2P) architecture in order to avoid the central aggregation of sensitive user data at one provider-controlled location. READ MORE