Amazon cover image
Image from Amazon.com

Privacy technologies and policy : 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13-14, 2019, Proceedings / Maurizio Naldi, Giuseppe F. Italiano, Kai Rannenberg, Manel Medina, Athena Bourka (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 11498. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham, Switzerland : Springer, 2019Description: 1 online resource (xii, 211 pages) : illustrations (some color)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783030217525
  • 3030217523
  • 3030217515
  • 9783030217518
  • 9783030217532
  • 3030217531
Other title:
  • APF 2019
Subject(s): Genre/Form: Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Intro; Preface; Organization; Contents; Transparency; Towards Real-Time Web Tracking Detection with T. EX -- The Transparency EXtension; 1 Introduction; 2 Objectives and Requirements; 3 Limitations; 4 Related Work; 5 Implementation; 5.1 HTTP and HTTPS Traffic Logging and Recording; 5.2 Persistent Storage of Records; 5.3 Encryption and Decryption of Chunks; 5.4 Data Visualization; 6 Evaluation; 7 Conclusion and Outlook; References; Towards Transparency in Email Tracking; 1 Introduction; 2 Related Work; 3 System Overview; 3.1 Adding a Service; 3.2 Analyzing Emails; 3.3 Providing Transparency
3.4 Challenges4 Preliminary Results; 4.1 Case Study 1: Individual Service Analysis; 4.2 Case Study 2: A/B Testing; 4.3 Case Study 3: Link Personalization; 5 Future Work; 6 Conclusion; References; Sharing Cyber Threat Intelligence Under the General Data Protection Regulation; Abstract; 1 Introduction; 2 Methodology; 2.1 Defining DataTags Related to Cybersecurity Information Sharing; 2.2 Policy Space; 2.3 Decision Graph; 3 Use Cases; 4 Related Work; 5 Conclusion and Future Work; Acknowledgment; References; Users' Rights
Fight to Be Forgotten: Exploring the Efficacy of Data Erasure in Popular Operating Systems1 Introduction; 2 Background; 2.1 Personal Data Hygiene; 2.2 Delete and Erase Functions; 3 Methodology; 3.1 Forensic Analysis; 4 Results; 4.1 macOS 10.14; 4.2 Windows 10; 4.3 Results of Forensic Analysis; 5 Discussion; 5.1 Default Options; 5.2 Incorrect Terminology; 5.3 Insufficient Guidance and Cues; 5.4 OS-Independent Implications; 6 Limitations; 7 Conclusion; References
Privacy Beyond Confidentiality, Data Science Beyond Spying: From Movement Data and Data Privacy Towards a Wider Fundamental Rights Discourse1 Introduction; 2 Case Study 1: New York City Tax Rides Dataset; 3 Case Study 2: AIS Data for Describing Migrant Rescue Operations; 4 Towards a Comparative Analysis; 5 Conclusion; References; Making Machine Learning Forget; 1 Introduction; 2 The ``Right-to-be-Forgotten; 3 Privacy Leakage in Machine Learning Systems; 4 Implementing ``Right-to-be-Forgotten'' in Machine Learning Models; 4.1 Influence Functions; 4.2 Differential Privacy
4.3 Machine Unlearning5 Discussion and Conclusions; References; Risk Assessment; A Multilateral Privacy Impact Analysis Method for Android Apps; 1 Introduction; 2 Data Acquisition Methodology; 2.1 Permission Manifest Analysis (A1); 2.2 Privacy Policy Analysis (A2); 2.3 Permission Usage Analysis (A3); 2.4 User Reviews Analysis (A4); 3 Multilateral Analysis; 3.1 Step A1: Permission Manifest Analysis; 3.2 Step A2: Privacy Policy Analysis; 3.3 Step A3: Permission Usage Analysis; 3.4 Step A4: User Reviews Analysis; 3.5 Synthesis of Analysis; 4 Related Work; 5 Conclusions and Future Work
Summary: This book constitutes the refereed conference proceedings of the 7th Annual Privacy Forum, APF 2019, held in Rome, Italy, in June 2019. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers present original work on the themes of data protection and privacy and their repercussions on technology, business, government, law, society, policy and law enforcement bridging the gap between research, business models, and policy. They are organized in topical sections on transparency, users' rights, risk assessment, and applications.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

International conference proceedings.

Includes author index.

Online resource; title from PDF title page (SpringerLink, viewed July 3, 2019).

This book constitutes the refereed conference proceedings of the 7th Annual Privacy Forum, APF 2019, held in Rome, Italy, in June 2019. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers present original work on the themes of data protection and privacy and their repercussions on technology, business, government, law, society, policy and law enforcement bridging the gap between research, business models, and policy. They are organized in topical sections on transparency, users' rights, risk assessment, and applications.

Intro; Preface; Organization; Contents; Transparency; Towards Real-Time Web Tracking Detection with T. EX -- The Transparency EXtension; 1 Introduction; 2 Objectives and Requirements; 3 Limitations; 4 Related Work; 5 Implementation; 5.1 HTTP and HTTPS Traffic Logging and Recording; 5.2 Persistent Storage of Records; 5.3 Encryption and Decryption of Chunks; 5.4 Data Visualization; 6 Evaluation; 7 Conclusion and Outlook; References; Towards Transparency in Email Tracking; 1 Introduction; 2 Related Work; 3 System Overview; 3.1 Adding a Service; 3.2 Analyzing Emails; 3.3 Providing Transparency

3.4 Challenges4 Preliminary Results; 4.1 Case Study 1: Individual Service Analysis; 4.2 Case Study 2: A/B Testing; 4.3 Case Study 3: Link Personalization; 5 Future Work; 6 Conclusion; References; Sharing Cyber Threat Intelligence Under the General Data Protection Regulation; Abstract; 1 Introduction; 2 Methodology; 2.1 Defining DataTags Related to Cybersecurity Information Sharing; 2.2 Policy Space; 2.3 Decision Graph; 3 Use Cases; 4 Related Work; 5 Conclusion and Future Work; Acknowledgment; References; Users' Rights

Fight to Be Forgotten: Exploring the Efficacy of Data Erasure in Popular Operating Systems1 Introduction; 2 Background; 2.1 Personal Data Hygiene; 2.2 Delete and Erase Functions; 3 Methodology; 3.1 Forensic Analysis; 4 Results; 4.1 macOS 10.14; 4.2 Windows 10; 4.3 Results of Forensic Analysis; 5 Discussion; 5.1 Default Options; 5.2 Incorrect Terminology; 5.3 Insufficient Guidance and Cues; 5.4 OS-Independent Implications; 6 Limitations; 7 Conclusion; References

Privacy Beyond Confidentiality, Data Science Beyond Spying: From Movement Data and Data Privacy Towards a Wider Fundamental Rights Discourse1 Introduction; 2 Case Study 1: New York City Tax Rides Dataset; 3 Case Study 2: AIS Data for Describing Migrant Rescue Operations; 4 Towards a Comparative Analysis; 5 Conclusion; References; Making Machine Learning Forget; 1 Introduction; 2 The ``Right-to-be-Forgotten; 3 Privacy Leakage in Machine Learning Systems; 4 Implementing ``Right-to-be-Forgotten'' in Machine Learning Models; 4.1 Influence Functions; 4.2 Differential Privacy

4.3 Machine Unlearning5 Discussion and Conclusions; References; Risk Assessment; A Multilateral Privacy Impact Analysis Method for Android Apps; 1 Introduction; 2 Data Acquisition Methodology; 2.1 Permission Manifest Analysis (A1); 2.2 Privacy Policy Analysis (A2); 2.3 Permission Usage Analysis (A3); 2.4 User Reviews Analysis (A4); 3 Multilateral Analysis; 3.1 Step A1: Permission Manifest Analysis; 3.2 Step A2: Privacy Policy Analysis; 3.3 Step A3: Permission Usage Analysis; 3.4 Step A4: User Reviews Analysis; 3.5 Synthesis of Analysis; 4 Related Work; 5 Conclusions and Future Work

Powered by Koha