抛媚眼 发表于 2025-3-25 05:30:46

QUANT: A User-Centered Privacy Risk Analysis Frameworkntion takes place once the data is out of her control. In this paper, we present a user-centered privacy risk quantification framework coupled with granular and usable privacy risk warnings. The framework takes a new approach in that it empowers users to take informed privacy protection decisions prior to unintended data disclosure.

顾客 发表于 2025-3-25 08:23:56

http://reply.papertrans.cn/84/8309/830813/830813_22.png

羊栏 发表于 2025-3-25 13:48:19

http://reply.papertrans.cn/84/8309/830813/830813_23.png

RAFF 发表于 2025-3-25 18:03:02

0302-9743 rmission; secure embedded systems; network and cloud security; information security policy; data protection and machine learning for security; distributed detection system and blockchain..978-3-030-41567-9978-3-030-41568-6Series ISSN 0302-9743 Series E-ISSN 1611-3349

olfction 发表于 2025-3-25 21:45:23

0302-9743 IS 2019, held in Hammamet, Tunisia, in October 2019..The 20 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They cover diverse research themes that range from classic topics, such as risk analysis and management; access control and pe

沐浴 发表于 2025-3-26 03:34:21

http://reply.papertrans.cn/84/8309/830813/830813_26.png

祝贺 发表于 2025-3-26 05:17:17

An Industrial Trial of an Approach to Identification and Modelling of Cybersecurity Risks in the Con safety, within the context of smart power grids. The approach, which consisted of a process and a modelling language, was a partially customized version of the existing “CORAS” risk-analysis approach. As a part of the study, feasibility of the approach was evaluated by applying it on an industrial

choleretic 发表于 2025-3-26 09:13:11

http://reply.papertrans.cn/84/8309/830813/830813_28.png

Pulmonary-Veins 发表于 2025-3-26 16:16:05

Systematic Asset Identification and Modeling During Requirements Engineering documenting them systematically in an asset model are the key activities in any risk management approach. Based on the ISO/IEC 27005 standard, the consideration of assets consists of two major activities: (i) asset identification, and (ii) asset valuation. However, despite the crucial role of asset

finale 发表于 2025-3-26 17:36:54

Inference Control in Distributed Environment: A Comparison Study into the desired object, however these models fail to protect sensitive data from being accessed with inference channels. An inference channel is produced by the combination of a legitimate response which the user receives from the system and metadata. Detecting and removing inference in database s
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Risks and Security of Internet and Systems; 14th International C Slim Kallel,Frédéric Cuppens,Ahmed Hadj Kacem Conference proceedings 2020