Searched for: subject:"Data%5C+privacy"
(1 - 16 of 16)
document
Kraaij, W. (author), Verberne, S. (author), Koldijk, S. (author), de Korte, E. (author), van Dantzig, S. (author), Sappelli, M. (author), Shoaib, M. (author), Bosems, S. (author), Achterkamp, R. (author), Bonomi, A. (author), Schavemaker, J. (author), Hulsebosch, B. (author), Wabeke, T. (author), Vollenbroek-Hutten, M. (author), Neerincx, M. (author), Sinderen, M. (author)
Recent advances in wearable sensor technology and smartphones enable simple and affordable collection of personal analytics. This paper reflects on the lessons learned in the SWELL project that addressed the design of user-centered ICT applications for self-management of vitality in the domain of knowledge workers. These workers often have a...
article 2020
document
mohajeri Parizi, M. (author), Sileno, G. (author), van Engers, T. (author)
Computational agents based upon the belief-desire-intention (BDI) architecture generally use reactive rules to trigger the execution of plans. For various reasons, certain plans might be preferred over others at design time. Most BDI agents platforms use hard-coding these preferences in some form of the static ordering of the reactive rules, but...
conference paper 2019
document
Honig, J.J. (author), Everts, M.H. (author), Huisman, M. (author)
Solidity smart contracts operate in a hostile environment, which introduces the need for the adequate application of testing techniques to ensure mitigation of the risk of a security incident. Mutation testing is one such technique. It allows for the evaluation of the efficiency of a test suite in detecting faults in a program, allowing...
conference paper 2019
document
van Lieshout, M.J. (author), Emmert, S.B. (author)
The right to privacy is enshrined in the European charter of fundamental rights. The right to data protection is a relatively novel right, also enshrined in the same European charter. While these rights seem to focus on a defensive and protective approach, they also give rise to a positive and constructive interpretation. The GDPR may act as...
conference paper 2018
document
Nateghizad, M. (author), Veugen, P.J.M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In...
conference paper 2018
document
Brouwer, A.M. (author), van de Water, L. (author), Hogervorst, M.A. (author), Kraaij, W. (author), Schraagen, J.M.C. (author), Hogenelst, K. (author)
Monitoring an individual’s mental state using unobtrusively measured signals is regarded as an essential element in symbiotic human-machine systems. However, it is not straightforward to model the relation between mental state and such signals in real life, without resorting to (unnatural) emotion induction. We recorded heart rate, facial...
conference paper 2018
document
Veugen, T. (author), Doumen, J. (author), Erkin, Z. (author), Pellegrino, G. (author), Verwer, S. (author), Weber, J. (author)
We consider dynamic group services, where outputs based on small samples of privacy-sensitive user inputs are repetitively computed. The leakage of user input data is analysed, caused by producing multiple outputs, resulting from inputs of frequently changing sets of users. A cryptographic technique, known as random user selection, is...
article 2017
document
Lueks, W. (author), Everts, M.H. (author), Hoepman, J.H. (author)
Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation, most of the damage has already been done. To help...
conference paper 2016
document
Veugen, P.J.M. (author), Blom, F. (author), de Hoogh, S.J.A. (author), Erkin, Z. (author)
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair...
article 2015
document
Erkin, Z. (author), Veugen, P.J.M. (author)
Millions of people are now increasingly using smart devices at home to improve the quality of their lives. Unfortunately, the smart devices that we use at home for comfort and sim-plicity make our lives more complicated in terms of man-agement due to several issues like mismatching interfaces and complexity of the micro-management. One approach...
conference paper 2014
document
Makri, E. (author), Everts, M.H. (author), de Hoogh, S. (author), Peter, A. (author), op den Akker, H. (author), Hartel, P.H. (author), Jonker, W. (author)
We treat the problem of privacy-preserving statistics verification in clinical research. We show that given aggregated results from statistical calculations, we can verify their correctness efficiently, without revealing any of the private inputs used for the calculation. Our construction is based on the primitive of Secure Multi-Party...
conference paper 2014
document
van den Broek, E.L. (author), Spitters, M.M. (author)
Throughout the last 40 years, the security breach caused by human error is often disregarded. To relief the latter problem, this article introduces a new class of biometrics that is founded on processing physiological personal features, as opposed to physical and behavioral features. After an introduction on authentication, physiological signals...
conference paper 2013
document
Janic, M. (author), Wijbenga, J.P. (author), Veugen, P.J.M. (author)
As the amount of users' information collected and exchanged on the Internet is growing, so are, consequently, the users' concerns that their privacy might be violated. Some studies have shown that a large number of users avoid engaging in online services due to privacy concerns. It has been suggested that increased transparency of privacy...
conference paper 2013
document
Erkin, Z. (author), Beye, M. (author), Veugen, P.J.M. (author), Lagendijk, R.L. (author)
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused by the service provider. To protect user privacy, we propose to encrypt the data and generate recommendations by processing them under encryption. Thus, the service...
conference paper 2011
document
Cederquist, J.G. (author), Corin, R. (author), Dekker, M.A.C. (author), Etalle, S. (author), den Hartog, J.I. (author), Lenzini, G. (author), TNO Informatie- en Communicatietechnologie (author)
In this paper we introduce a new framework for controlling compliance to discretionary access control policies [Cederquist et al. in Proceedings of the International Workshop on Policies for Distributed Systems and Networks (POLICY), 2005; Corin et al. in Proceedings of the IFIP Workshop on Formal Aspects in Security and Trust (FAST), 2004]. The...
article 2007
document
Meijer, R.J. (author), Strijkers, R.J. (author), Gommans, L. (author), de Laat, C. (author)
This paper introduces the concept of a User Programmable Virtualized Network, which allows networks to deliver application specific services using network element components that developers can program as part of a users application. The use of special tokens in data or control packets is the basis of a practical, yet powerful security and AAA...
conference paper 2006
Searched for: subject:"Data%5C+privacy"
(1 - 16 of 16)