The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The security and privacy of patient information is one of the biggest hindrances to the wide adoption of eHealth systems. For eHealth systems to be successful they must provide protection for patients' privacy while ensuring healthcare professionals are able to access the information necessary to provide appropriate care. Accountable-eHealth systems are a proposed solution to these potentially competing...
Applications that continuously gather and disclose personal information about users are increasingly common. While disclosing this information may be essential for these applications to function, it may also raise privacy concerns. Partly, this is due to frequently changing context that introduces new privacy threats, and makes it difficult to continuously satisfy privacy requirements. To address...
Web services technology is widely used as a solution of information by all users. Now a days, the user rely on web for the information need but the currently available search engines though using sophisticated document indexing algorithms, quite often gives a long list of results, much of which are not always relevant to the user's requirement. Since a user has a specific goal when searching for information,...
User awareness has become a popular feature in many social web applications. In classic text-based web-systems, user awareness features show how many users are online in a web application or how many users are accessing the same web page. When time based media like web lectures are concerned this approach comes to its limits since time-based media are inherently different from classic text-based media...
Nowadays, online social network data are increasingly made publicly available to third parties. Several anonymization techniques have been studied and adopted to preserve privacy in the publishing of data. However, recent works have shown that de-anonymization of the released data is not only possible but also practical. In this paper, we present a brief yet systematic review of the existing de-anonymization...
Until now informational self-determination has not been examined in relation to context prediction. The right of users to decide whether or not and how they want their personal data to be used is not ensured. This paper analyses the problem by introducing the state of the art and application fields of context prediction with focus on the users' personal data. Subsequently, informational self-determination...
Bug report is becoming a main approach to improve and perfect a complicated piece of software, but analyzing the bug report is a tedious and time-consuming job, especially when the number of bug reports is huge and many duplicate reports are mixed within the incoming bug reports. In this paper, we present a framework to automatically triage and detect the duplicate bug reports by keywords extraction...
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happen in collaborative environment. Therefore, the definition of an efficient access control model, based on which privacy policies can be specified, is crucial. In this work, we propose a trust-based access control model to...
There are various critical privacy issues that need to be addressed in the majority of smart space environments. This paper elaborates on the design of a privacy protection framework for personal self-improving smart spaces (PSSs), a concept introduced by the persist project consortium. Compared to other smart spaces, such as smart homes and vehicles, this new paradigm provides a truly ubiquitous...
Networked enterprises create virtual teams of distributed experts belonging to different enterprises where one user can be part of multiple teams; How to effectively control the sharing of personal and shared context information among members of multiple overlapping teams without compromising their privacy is a challenging research question. This paper describes sharing control in Peer to Peer and...
To realize a practical context-aware system, we should be clearly aware of important issues in context-aware systems. In this paper, we review a wide range of existing researches and the history of context-aware systems. We derive technical issues on realizing context-aware services based on the history and explain them. In addition, we describe seven context-aware service scenarios and discuss related...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.