Mostrando 10 resultados de: 15
Publisher
IEEE Access(3)
Proceedings of the ACM Symposium on Applied Computing(2)
Universidad de Cuenca(2)
ACM International Conference Proceeding Series(1)
Challenges in Cybersecurity and Privacy: the European Research Landscape(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(7)
Ciencias de la computación(5)
Programación informática, programas, datos, seguridad(5)
Otros problemas y servicios sociales(3)
Interacción social(2)
Automated GDPR compliance assessment for cross-border personal data transfers in android applications
ArticleAbstract: The General Data Protection Regulation (GDPR) aims to ensure that all personal data processing activPalabras claves:D.4.6 security and privacy protection, J.9 mobile applications, K.4.1.f privacy, K.4.1.g regulation, k.4.1.h transborder data flowAutores:Danny S. Guamán, del Álamo J.M., Rodriguez D., Such J.Fuentes:googlescopusAn exploratory experiment on privacy patterns: Limitations and possibilities
Conference ObjectAbstract: Several1 privacy engineering methods and techniques have built on privacy patterns for materializingPalabras claves:empirical, experiment, Privacy by design, Privacy patternsAutores:Angel Jaramillo-Alcázar, Danny S. Guamán, Del Lamo J.M., Julio C. CaizaFuentes:googlescopusA Systematic Mapping Study on Software Quality Control Techniques for Assessing Privacy in Information Systems
ArticleAbstract: Software Quality Control (SQC) techniques are widely used throughout the software development procesPalabras claves:Data Protection, Information Systems, Mapping, privacy, Software Engineering, software quality control, Systematic studyAutores:Danny S. Guamán, del Álamo J.M., Julio C. CaizaFuentes:googlescopusA framework and roadmap for enhancing the application of privacy design patterns
Conference ObjectAbstract: Privacy patterns have become a cornerstone of the Privacy by Design paradigm realization by being usPalabras claves:Data Protection, Design pattern, Pattern application, Pattern lifecycle, Privacy by design, privacy engineering, privacy pattern, Security pattern, Software EngineeringAutores:Danny S. Guamán, del Álamo J.M., Julio C. CaizaFuentes:googlescopusA response toolkit to provide an active response against intrusions using Ontology-Based IRS
ArticleAbstract: Active response systems are intended to run an automatic response against an intrusion. However, runPalabras claves:Autores:Danny S. Guamán, Julio C. Caiza, Verónica MateosFuentes:rraaeA systematic mapping study on automated analysis of privacy policies
ArticleAbstract: A privacy policy describes the operations an organization carries out on its users’ personal data anPalabras claves:Data Protection, Natural Language processing, privacy, Privacy policyAutores:Danny S. Guamán, del Álamo J.M., Diez A., García B.Fuentes:googlescopusGDPR Compliance Assessment for Cross-Border Personal Data Transfers in Android Apps
ArticleAbstract: The pervasiveness of Android mobile applications and the services they support allow the personal daPalabras claves:android, Application, assessment, ASSURANCE, COMPLIANCE, Data Protection, dynamic analysis, Evaluation, GDPR, Mobile, privacy, Software quality, TESTINGAutores:Danny S. Guamán, del Álamo J.M., Julio C. CaizaFuentes:googlescopusOrganizing design patterns for privacy: A taxonomy of types of relationships?
Conference ObjectAbstract: There has recently been an upsurge of legislative, technical and organizational frameworks in the fiPalabras claves:design patterns, Pattern language, privacy engineeringAutores:Danny S. Guamán, del Álamo J.M., Julio C. Caiza, Martín Y.S.Fuentes:googlescopusValue-based core areas of trustworthiness in online services
Conference ObjectAbstract: In the digital domain, users can be expected to place their trust in online services if they have aPalabras claves:ASSURANCE, Data Protection, Ethical, Label, Legal, privacy, requirements, Sociological, trust, TrustworthinessAutores:Danny S. Guamán, del Álamo J.M., Haselbacher A., Reichmann S., Veljanova H.Fuentes:googlescopusRanking online services by the core areas of trustworthiness
ArticleAbstract: Citizens’ trust in online services remains very low as they come across certain difficulties in apprPalabras claves:assessment, Online services, Social Science and Humanities, trust, TrustworthinessAutores:Danny S. Guamán, del Álamo J.M., Haselbacher A., Julio C. Caiza, Veljanova H.Fuentes:googlescopus