Mostrando 10 resultados de: 13
Publisher
IEEE Access(3)
Proceedings of the ACM Symposium on Applied Computing(3)
ACM International Conference Proceeding Series(2)
Universidad de Cuenca(2)
6th IEEE Ecuador Technical Chapters Meeting, ETCM 2022(1)
Área temáticas
Programación informática, programas, datos, seguridad(6)
Ciencias de la computación(5)
Funcionamiento de bibliotecas y archivos(4)
Interacción social(3)
Otros problemas y servicios sociales(3)
An exploratory experiment on privacy patterns: Limitations and possibilities
Conference ObjectAbstract: Several1 privacy engineering methods and techniques have built on privacy patterns for materializingPalabras claves:empirical, experiment, Privacy by design, Privacy patternsAutores:Angel Jaramillo-Alcázar, Danny S. Guamán, Del Lamo J.M., Julio C. CaizaFuentes:googlescopusA Systematic Mapping Study on Software Quality Control Techniques for Assessing Privacy in Information Systems
ArticleAbstract: Software Quality Control (SQC) techniques are widely used throughout the software development procesPalabras claves:Data Protection, Information Systems, Mapping, privacy, Software Engineering, software quality control, Systematic studyAutores:Danny S. Guamán, del Álamo J.M., Julio C. CaizaFuentes:googlescopusA framework and roadmap for enhancing the application of privacy design patterns
Conference ObjectAbstract: Privacy patterns have become a cornerstone of the Privacy by Design paradigm realization by being usPalabras claves:Data Protection, Design pattern, Pattern application, Pattern lifecycle, Privacy by design, privacy engineering, privacy pattern, Security pattern, Software EngineeringAutores:Danny S. Guamán, del Álamo J.M., Julio C. CaizaFuentes:googlescopusA response toolkit to provide an active response against intrusions using Ontology-Based IRS
ArticleAbstract: Active response systems are intended to run an automatic response against an intrusion. However, runPalabras claves:Autores:Danny S. Guamán, Julio C. Caiza, Verónica MateosFuentes:rraaeA system of privacy patterns for informing users: Creating a pattern system
Conference ObjectAbstract: The General Data Protection Regulation mandates data protection in the European Union. This includesPalabras claves:Data Protection, Pattern system, Privacy by design, Privacy design strategies, Privacy patternsAutores:Colesky M., Julio C. CaizaFuentes:googlescopusA system of privacy patterns for user control
Conference ObjectAbstract: Privacy by Design is prescribed by the new European General Data Protection Regulation. Getting thisPalabras claves:Data Protection, Pattern system, Privacy by design, Privacy design strategies, Privacy patternsAutores:Colesky M., Del Lamo J.M., Hoepman J.H., Julio C. Caiza, Martín Y.S.Fuentes:googlescopusDesign of a collaborative website to study 5G networks
Conference ObjectAbstract: 5G is a new technology that amply evolves previous cellular network technology. The 3rd Generation PPalabras claves:5G, Information architecture, Usability testingAutores:Grace Montenegro Játiva, Julio C. Caiza, Martha Cecilia ParedesFuentes:googlescopusGDPR Compliance Assessment for Cross-Border Personal Data Transfers in Android Apps
ArticleAbstract: The pervasiveness of Android mobile applications and the services they support allow the personal daPalabras claves:android, Application, assessment, ASSURANCE, COMPLIANCE, Data Protection, dynamic analysis, Evaluation, GDPR, Mobile, privacy, Software quality, TESTINGAutores:Danny S. Guamán, del Álamo J.M., Julio C. CaizaFuentes:googlescopusOrganizing design patterns for privacy: A taxonomy of types of relationships?
Conference ObjectAbstract: There has recently been an upsurge of legislative, technical and organizational frameworks in the fiPalabras claves:design patterns, Pattern language, privacy engineeringAutores:Danny S. Guamán, del Álamo J.M., Julio C. Caiza, Martín Y.S.Fuentes:googlescopusTowards organizing the growing knowledge on privacy engineering
Conference ObjectAbstract: Regulation asks engineers to stick to privacy and data protection principles and apply them throughoPalabras claves:Data Protection, privacy, Software EngineeringAutores:del Álamo J.M., Julio C. Caiza, Martín Y.S.Fuentes:googlescopus