Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Create, Read, Update, Delete: Implications on Security and Privacy Principles regarding GDPR
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 178, Pages 1–7https://doi.org/10.1145/3664476.3670898Create, Read, Update and Delete operations (CRUD) are a well-established abstraction to model data access in software systems of different architectures. Most system requirements, generated during the specification phase, will be realized by combining ...
- research-articleJuly 2024
Behavioural Modelling for Sustainability in Smart Homes
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 57, Pages 1–11https://doi.org/10.1145/3664476.3670946This paper explores the critical aspects of behavioural modelling for sustainability in smart homes, emphasising the integration of advanced technologies to enhance energy efficiency, convenience, security, and overall quality of life. Smart homes ...
- research-articleJuly 2024
Individual privacy levels in query-based anonymization
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 182, Pages 1–8https://doi.org/10.1145/3664476.3670920Artificial intelligence systems such as Large Language Models (LLM) derive their knowledge from large datasets. Systems like ChatGPT therefore rely on shared data to train on. For companies, releasing data to the public domain requires anonymization as ...
- research-articleJuly 2024
A Unified Framework for GDPR Compliance in Cloud Computing
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 177, Pages 1–9https://doi.org/10.1145/3664476.3670918In parallel with the rapid development of Information and Communication technologies and the digitization of information in every aspect of daily life, the enforcement of the GDPR, in May 2018, brought significant changes to the processes that ...
- research-articleJuly 2024
Further Insights: Balancing Privacy, Explainability, and Utility in Machine Learning-based Tabular Data Analysis
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 176, Pages 1–10https://doi.org/10.1145/3664476.3670901In this paper, we present further contributions to the field of privacy-preserving and explainable data analysis applied to tabular datasets. Our approach defines a comprehensive optimization criterion that balances the key aspects of data privacy, ...
- research-articleJuly 2024
Proxy Re-Encryption for Enhanced Data Security in Healthcare: A Practical Implementation
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 152, Pages 1–11https://doi.org/10.1145/3664476.3670874In the rapidly evolving digital healthcare landscape, the imperative for robust, flexible, and scalable data protection solutions has never been more critical. The advent of sophisticated cyber threats, coupled with the increasing complexity of ...
- research-articleJuly 2024
The Right to Be Zero-Knowledge Forgotten
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 110, Pages 1–9https://doi.org/10.1145/3664476.3669973The main goal of the EU GDPR is to protect personal data of individuals within the EU. This is expressed in several rights and, among them, in this work we focus on the Right to Erasure, more commonly known as the Right to Be Forgotten (RtBF).
There is ...
- research-articleJuly 2024
Open V2X Management Platform Cyber-Resilience and Data Privacy Mechanisms
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 139, Pages 1–8https://doi.org/10.1145/3664476.3669917Vehicle-to-Everything (V2X) technologies have been recently introduced to provide enhanced connectivity between the different smart grid segments as well as Electric Vehicles (EVs). The EVs draw power to the grid and may be used as an energy flexibility ...
- research-articleJuly 2024
Advanced methods for generalizing time and duration during dataset anonymization
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 131, Pages 1–11https://doi.org/10.1145/3664476.3669916Time is an often recurring quasi-identifying attribute in many datasets. Anonymizing such datasets requires generalizing the time attribute(s) in the dataset. Examples are start dates and durations, which are traditionally generalized leading to ...
- research-articleJuly 2024
Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledge
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 6, Pages 1–12https://doi.org/10.1145/3664476.3664489Data processors increasingly rely on external data sources to improve strategic or operational decision taking. Data owners can facilitate this by releasing datasets directly to data processors or doing so indirectly via data spaces. As data processors ...