Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2011
Trustworthy middleware services in the cloud
CloudDB '11: Proceedings of the third international workshop on Cloud data managementPages 33–40https://doi.org/10.1145/2064085.2064094Establishing trust in systems is a difficult problem to tackle. In the Cloud, establishing trust is even more complicated considering its dynamic nature and distributed resources. One of the Cloud's potential feature is providing transparent management ...
- ArticleJuly 2011
A Home Healthcare System in the Cloud--Addressing Security and Privacy Challenges
CLOUD '11: Proceedings of the 2011 IEEE 4th International Conference on Cloud ComputingPages 549–556https://doi.org/10.1109/CLOUD.2011.108Cloud computing is an emerging technology that is expected to support Internet scale critical applications which could be essential to the healthcare sector. Its scalability, resilience, adaptability, connectivity, cost reduction, and high performance ...
- articleMarch 2011
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
Requirements Engineering (REQE), Volume 16, Issue 1Pages 3–32https://doi.org/10.1007/s00766-010-0115-7Ready or not, the digitalization of information has come, and privacy is standing out there, possibly at stake. Although digital privacy is an identified priority in our society, few systematic, effective methodologies exist that deal with privacy ...
- research-articleDecember 2010
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security (TIFS), Volume 5, Issue 4Pages 920–931https://doi.org/10.1109/TIFS.2010.2072830Buyer-seller watermarking (BSW) protocols allow copyright protection of digital content. The protocol is anonymous when the identity of buyers is not revealed if they do not release pirated copies. Existing BSW protocols are not provided with a formal ...
- research-articleSeptember 2009
An efficient buyer-seller watermarking protocol based on composite signal representation
MM&Sec '09: Proceedings of the 11th ACM workshop on Multimedia and securityPages 9–18https://doi.org/10.1145/1597817.1597820Buyer-seller watermarking protocols integrate watermarking techniques with cryptography, for copyright protection, piracy tracing, and privacy protection. In this paper, we propose an efficient buyer-seller watermarking protocol based on homomorphic ...
- ArticleAugust 2008
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
ISECS '08: Proceedings of the 2008 International Symposium on Electronic Commerce and SecurityPages 923–929Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after trading activities in e-commerce. In this paper, we ...
- ArticleJune 2008
On Secure and Anonymous Buyer-Seller Watermarking Protocol
ICIW '08: Proceedings of the 2008 Third International Conference on Internet and Web Applications and ServicesPages 524–529https://doi.org/10.1109/ICIW.2008.28Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after purchase activities in e-commerce. In this paper, we ...
- ArticleJune 2006
Personal rights management – taming camera-phones for individual privacy enforcement
PET'06: Proceedings of the 6th international conference on Privacy Enhancing TechnologiesPages 172–189https://doi.org/10.1007/11957454_10With ubiquitous use of digital camera devices, especially in mobile phones, privacy is no longer threatened by governments and companies only. The new technology creates a new threat by ordinary people, who could take and distribute pictures of an ...
- ArticleSeptember 2005
Personal rights management– enabling privacy rights in digital online content
CMS'05: Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia SecurityPages 266–268https://doi.org/10.1007/11552055_28With ubiquitous use of digital cameras, e.g. in mobile phones, privacy is no longer threatened by governments and companies only. A new threat exists by people, who take photos of unaware people with no risk and little cost anywhere in public and ...