Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Computers And Society (K.4) > Public Policy Issues (K.4.1) > Privacy (K.4.1...)  
 
Options:
 
  1-10 of 228 Reviews about "Privacy (K.4.1...)": Date Reviewed
  Carebit: a privacy-preserving "step" toward remote informal caregiving
Ghosh A., Aljallad Z., Badillo-Urquiola K., Wisniewski P.  GROUP 2018 (Proceedings of the 2018 ACM Conference on Supporting Groupwork, Sanibel Island, FL,  Jan 7-10, 2018) 154-157, 2018. Type: Proceedings

Carebit is an application to help caregivers working with elderly people who are living independently. In practice, the person being monitored wears a Fitbit synced to the Internet. He or she initiates the check-in. The app shows the caregiver the...

Apr 13 2018
  Digital privacy and security using Windows: a practical guide
Hassan N., Hijazi R.,  Apress, New York, NY, 2017. 284 pp. Type: Book (978-1-484227-98-5)

Anyone who is not worried about personal privacy on the Internet should read this book, as it makes painfully clear how easy our privacy is compromised by various players. Likewise, those who think they are aware of this already should read this b...

Apr 4 2018
   Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city
Lai J., Mu Y., Guo F., Susilo W., Chen R.  Personal and Ubiquitous Computing 21(5): 855-868, 2017. Type: Article

The “smart city” will provide numerous services via broadcasted encrypted data, such as a pin or key for paid users to access water service. These researchers go beyond data security and consider data access control and identity privac...

Jan 10 2018
  Android platform-based individual privacy information protection system
Zhang W., Li X., Xiong N., Vasilakos A.  Personal and Ubiquitous Computing 20(6): 875-884, 2016. Type: Article

I’m not impressed by this paper. On one hand, the remote short message service (SMS) command feature it describes sounds potentially useful. On the other hand, remote commands are not new and do not constitute a “privacy information pr...

Nov 7 2017
  Data protection and privacy: (in)visibilities and infrastructures
Leenes R., van Brakel R., Gutwirth S., De Hert P.,  Springer International Publishing, New York, NY, 2017. 295 pp. Type: Book (978-3-319507-95-8)

This work was selected from materials presented at the 9th International Conference on Computers, Privacy, and Data Protection, held in Brussels in January 2016. The ten chapters were selected from the 80 panels and 343 speakers who presented at t...

Oct 25 2017
  Fog computing for the Internet of Things: security and privacy issues
Alrawais A., Alhothaily A., Hu C., Cheng X.  IEEE Internet Computing 21(2): 34-42, 2017. Type: Article

Connecting everything to the Internet is attractive because it can bring efficiency and convenience in many areas. However, security and privacy issues can also occur. The problem is that it is difficult to apply existing security and privacy solu...

Sep 7 2017
  The European Union as guardian of Internet privacy: the story of Art 16 TFEU
Hijmans H.,  Springer International Publishing, New York, NY, 2016. 604 pp. Type: Book (978-3-319340-89-0)

The European Union (EU) treats data protection and personal privacy as fundamental rights, unlike the US. Any business operating in Europe must understand a number of privacy-related treaties and directives, including Article 16. Article 16(1) rea...

Mar 23 2017
  Practical approximate k-nearest neighbor queries with location and query privacy
Yi X., Paulet R., Bertino E., Varadharajan V.  IEEE Transactions on Knowledge and Data Engineering 28(6): 1546-1559, 2016. Type: Article

Location-based services (LBS) have been used as a Trojan horse to reveal users’ private data. Since they run on mobile applications, individuals can share real-time and historical location information online....

Sep 20 2016
  Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality
Kurek T., Niemiec M., Lason A.  International Journal of Information Security 15(3): 235-250, 2016. Type: Article

Would you intentionally make your firewall leak packets that are supposed to be blocked? This paper presents an interesting argument for when this might be desired....

Sep 12 2016
   Safeguarding users’ sensitive data in the cloud and the browser
Brad Karp. YouTube, 00:53:52, published on May 4, 2016, The Alan Turing Institute, https://www.youtube.com/watch?v=vws4xF6gXmU. Type: Video

In this 54-minute video presentation, Brad Karp of University College London talks about “safeguarding users’ sensitive data in the cloud and the browser.” The title is very inviting to those who want to know how to protect sensi...

Sep 6 2016
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy