Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Privacy model). Showing records 1 – 30 of 45 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


UCLA

1. Chakraborty, Supriyo. Balancing Behavioral Privacy and Information Utility in Sensory Data Flows.

Degree: Electrical Engineering, 2014, UCLA

 The democratization of computing and sensing through smart phones and embedded devices has led to widespread instrumentation of our personal and social spaces. The sensor… (more)

Subjects/Keywords: Electrical engineering; Computer science; Android; Inferences; Mobile; Model-based privacy; Privacy; Sensor data

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chakraborty, S. (2014). Balancing Behavioral Privacy and Information Utility in Sensory Data Flows. (Thesis). UCLA. Retrieved from http://www.escholarship.org/uc/item/5ks1201h

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chakraborty, Supriyo. “Balancing Behavioral Privacy and Information Utility in Sensory Data Flows.” 2014. Thesis, UCLA. Accessed July 17, 2019. http://www.escholarship.org/uc/item/5ks1201h.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chakraborty, Supriyo. “Balancing Behavioral Privacy and Information Utility in Sensory Data Flows.” 2014. Web. 17 Jul 2019.

Vancouver:

Chakraborty S. Balancing Behavioral Privacy and Information Utility in Sensory Data Flows. [Internet] [Thesis]. UCLA; 2014. [cited 2019 Jul 17]. Available from: http://www.escholarship.org/uc/item/5ks1201h.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chakraborty S. Balancing Behavioral Privacy and Information Utility in Sensory Data Flows. [Thesis]. UCLA; 2014. Available from: http://www.escholarship.org/uc/item/5ks1201h

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Eastern Michigan University

2. Wuotinen, Keith A. Personal privacy: A study to determine views on privacy as it relates to technology acceptance.

Degree: PhD, College of Technology, 2016, Eastern Michigan University

  This descriptive correlation study sought to learn the relationships, if any, between a person’s concern for privacy and their acceptance of technology, in conjunction… (more)

Subjects/Keywords: Concern For Information Privacy; Privacy; Technology Acceptance Model; Information Security; Science and Technology Studies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wuotinen, K. A. (2016). Personal privacy: A study to determine views on privacy as it relates to technology acceptance. (Doctoral Dissertation). Eastern Michigan University. Retrieved from http://commons.emich.edu/theses/690

Chicago Manual of Style (16th Edition):

Wuotinen, Keith A. “Personal privacy: A study to determine views on privacy as it relates to technology acceptance.” 2016. Doctoral Dissertation, Eastern Michigan University. Accessed July 17, 2019. http://commons.emich.edu/theses/690.

MLA Handbook (7th Edition):

Wuotinen, Keith A. “Personal privacy: A study to determine views on privacy as it relates to technology acceptance.” 2016. Web. 17 Jul 2019.

Vancouver:

Wuotinen KA. Personal privacy: A study to determine views on privacy as it relates to technology acceptance. [Internet] [Doctoral dissertation]. Eastern Michigan University; 2016. [cited 2019 Jul 17]. Available from: http://commons.emich.edu/theses/690.

Council of Science Editors:

Wuotinen KA. Personal privacy: A study to determine views on privacy as it relates to technology acceptance. [Doctoral Dissertation]. Eastern Michigan University; 2016. Available from: http://commons.emich.edu/theses/690


NSYSU

3. Lai, Chia-Yin. A Dual-Process Perspective on Information Privacy Paradox: A Neural Science Study.

Degree: PhD, Information Management, 2018, NSYSU

 Information technologies have raised enduring concerns about privacy. Most people report that they worry about disclosures of their private information, yet keep revealing it through… (more)

Subjects/Keywords: Privacy paradox; privacy calculus; dual-process model; electroencephalographic (EEG); brain wave; neuroscience

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lai, C. (2018). A Dual-Process Perspective on Information Privacy Paradox: A Neural Science Study. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0716118-102718

Chicago Manual of Style (16th Edition):

Lai, Chia-Yin. “A Dual-Process Perspective on Information Privacy Paradox: A Neural Science Study.” 2018. Doctoral Dissertation, NSYSU. Accessed July 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0716118-102718.

MLA Handbook (7th Edition):

Lai, Chia-Yin. “A Dual-Process Perspective on Information Privacy Paradox: A Neural Science Study.” 2018. Web. 17 Jul 2019.

Vancouver:

Lai C. A Dual-Process Perspective on Information Privacy Paradox: A Neural Science Study. [Internet] [Doctoral dissertation]. NSYSU; 2018. [cited 2019 Jul 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0716118-102718.

Council of Science Editors:

Lai C. A Dual-Process Perspective on Information Privacy Paradox: A Neural Science Study. [Doctoral Dissertation]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0716118-102718


NSYSU

4. Wu, Min-Xun. Understanding the Impacts of Permission Requested on Mobile App Adoption.

Degree: Master, Information Management, 2014, NSYSU

 Because of the expanding of smartphones, the applications on smartphones, Apps, are widely discussed. In Android platform, Apps have to acquire permissions in order to… (more)

Subjects/Keywords: permission; Android; technology acceptance model; perceived privacy risk; social exchange theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, M. (2014). Understanding the Impacts of Permission Requested on Mobile App Adoption. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0711114-042645

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, Min-Xun. “Understanding the Impacts of Permission Requested on Mobile App Adoption.” 2014. Thesis, NSYSU. Accessed July 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0711114-042645.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, Min-Xun. “Understanding the Impacts of Permission Requested on Mobile App Adoption.” 2014. Web. 17 Jul 2019.

Vancouver:

Wu M. Understanding the Impacts of Permission Requested on Mobile App Adoption. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jul 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0711114-042645.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu M. Understanding the Impacts of Permission Requested on Mobile App Adoption. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0711114-042645

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

5. Lubars, Joseph. Improving the output of algorithms for large-scale approximate graph matching.

Degree: MS, Electrical & Computer Engr, 2018, University of Illinois – Urbana-Champaign

 In approximate graph matching, the goal is to find the best correspondence between the labels of two correlated graphs. Recently, the problem has been applied… (more)

Subjects/Keywords: Privacy; Social Networks; De-anonymization; Approximate Graph Matching; Stochastic Block Model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lubars, J. (2018). Improving the output of algorithms for large-scale approximate graph matching. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/102401

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lubars, Joseph. “Improving the output of algorithms for large-scale approximate graph matching.” 2018. Thesis, University of Illinois – Urbana-Champaign. Accessed July 17, 2019. http://hdl.handle.net/2142/102401.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lubars, Joseph. “Improving the output of algorithms for large-scale approximate graph matching.” 2018. Web. 17 Jul 2019.

Vancouver:

Lubars J. Improving the output of algorithms for large-scale approximate graph matching. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2018. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/2142/102401.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lubars J. Improving the output of algorithms for large-scale approximate graph matching. [Thesis]. University of Illinois – Urbana-Champaign; 2018. Available from: http://hdl.handle.net/2142/102401

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Iowa State University

6. Bockholt, Chad. Markov Chain analysis of packet sequence for intrusion detection.

Degree: 2017, Iowa State University

 Intrusion Detection is a broad and complex field in cybersecurity. There are varieties of existing methods with varying degrees of success, which attempt to classify… (more)

Subjects/Keywords: Intrusion Detection; Markov Model; Packet Sequence; Privacy Preserving Analysis; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bockholt, C. (2017). Markov Chain analysis of packet sequence for intrusion detection. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/15264

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bockholt, Chad. “Markov Chain analysis of packet sequence for intrusion detection.” 2017. Thesis, Iowa State University. Accessed July 17, 2019. https://lib.dr.iastate.edu/etd/15264.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bockholt, Chad. “Markov Chain analysis of packet sequence for intrusion detection.” 2017. Web. 17 Jul 2019.

Vancouver:

Bockholt C. Markov Chain analysis of packet sequence for intrusion detection. [Internet] [Thesis]. Iowa State University; 2017. [cited 2019 Jul 17]. Available from: https://lib.dr.iastate.edu/etd/15264.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bockholt C. Markov Chain analysis of packet sequence for intrusion detection. [Thesis]. Iowa State University; 2017. Available from: https://lib.dr.iastate.edu/etd/15264

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kansas State University

7. Rahman, Muhammad Sajidur. An empirical case study on Stack Overflow to explore developers’ security challenges.

Degree: MS, Department of Computing and Information Sciences, 2016, Kansas State University

 The unprecedented growth of ubiquitous computing infrastructure has brought new challenges for security, privacy, and trust. New problems range from mobile apps with incomprehensible permission… (more)

Subjects/Keywords: Mining; Software Security; Security & Privacy; Software Engineering; Topic Model; Stack Overflow

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rahman, M. S. (2016). An empirical case study on Stack Overflow to explore developers’ security challenges. (Masters Thesis). Kansas State University. Retrieved from http://hdl.handle.net/2097/34563

Chicago Manual of Style (16th Edition):

Rahman, Muhammad Sajidur. “An empirical case study on Stack Overflow to explore developers’ security challenges.” 2016. Masters Thesis, Kansas State University. Accessed July 17, 2019. http://hdl.handle.net/2097/34563.

MLA Handbook (7th Edition):

Rahman, Muhammad Sajidur. “An empirical case study on Stack Overflow to explore developers’ security challenges.” 2016. Web. 17 Jul 2019.

Vancouver:

Rahman MS. An empirical case study on Stack Overflow to explore developers’ security challenges. [Internet] [Masters thesis]. Kansas State University; 2016. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/2097/34563.

Council of Science Editors:

Rahman MS. An empirical case study on Stack Overflow to explore developers’ security challenges. [Masters Thesis]. Kansas State University; 2016. Available from: http://hdl.handle.net/2097/34563


Washington University in St. Louis

8. Kusner, Matt J. Learning in the Real World: Constraints on Cost, Space, and Privacy.

Degree: PhD, Computer Science & Engineering, 2016, Washington University in St. Louis

  The sheer demand for machine learning in fields as varied as: healthcare, web-search ranking, factory automation, collision prediction, spam filtering, and many others, frequently… (more)

Subjects/Keywords: budgeted learning; differential privacy; machine learning; model compression; resource efficient learning; Computer Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kusner, M. J. (2016). Learning in the Real World: Constraints on Cost, Space, and Privacy. (Doctoral Dissertation). Washington University in St. Louis. Retrieved from https://openscholarship.wustl.edu/eng_etds/305

Chicago Manual of Style (16th Edition):

Kusner, Matt J. “Learning in the Real World: Constraints on Cost, Space, and Privacy.” 2016. Doctoral Dissertation, Washington University in St. Louis. Accessed July 17, 2019. https://openscholarship.wustl.edu/eng_etds/305.

MLA Handbook (7th Edition):

Kusner, Matt J. “Learning in the Real World: Constraints on Cost, Space, and Privacy.” 2016. Web. 17 Jul 2019.

Vancouver:

Kusner MJ. Learning in the Real World: Constraints on Cost, Space, and Privacy. [Internet] [Doctoral dissertation]. Washington University in St. Louis; 2016. [cited 2019 Jul 17]. Available from: https://openscholarship.wustl.edu/eng_etds/305.

Council of Science Editors:

Kusner MJ. Learning in the Real World: Constraints on Cost, Space, and Privacy. [Doctoral Dissertation]. Washington University in St. Louis; 2016. Available from: https://openscholarship.wustl.edu/eng_etds/305


Georgia State University

9. He, Zaobo. Privacy Preserving Data Publishing.

Degree: PhD, Computer Science, 2018, Georgia State University

  Recent years have witnessed increasing interest among researchers in protecting individual privacy in the big data era, involving social media, genomics, and Internet of… (more)

Subjects/Keywords: Inference Attack; Data Sanitization; Differential Privacy; SNP-Trait Association; Belief Propagation; Probabilistic Graphical Model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

He, Z. (2018). Privacy Preserving Data Publishing. (Doctoral Dissertation). Georgia State University. Retrieved from https://scholarworks.gsu.edu/cs_diss/141

Chicago Manual of Style (16th Edition):

He, Zaobo. “Privacy Preserving Data Publishing.” 2018. Doctoral Dissertation, Georgia State University. Accessed July 17, 2019. https://scholarworks.gsu.edu/cs_diss/141.

MLA Handbook (7th Edition):

He, Zaobo. “Privacy Preserving Data Publishing.” 2018. Web. 17 Jul 2019.

Vancouver:

He Z. Privacy Preserving Data Publishing. [Internet] [Doctoral dissertation]. Georgia State University; 2018. [cited 2019 Jul 17]. Available from: https://scholarworks.gsu.edu/cs_diss/141.

Council of Science Editors:

He Z. Privacy Preserving Data Publishing. [Doctoral Dissertation]. Georgia State University; 2018. Available from: https://scholarworks.gsu.edu/cs_diss/141


Delft University of Technology

10. Van den Berg, R.P. The networked brand identity: Management support tool for tension analysis in brand identity networks concerning privacy:.

Degree: 2014, Delft University of Technology

 A corporate brand is a complex construct, which might be difficult to manage because of a lack of insight into the network of relevant influencers.… (more)

Subjects/Keywords: network; brand; identity; management; tool; analysis; privacy; corporation; end-user; actor network theory; ac3id model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van den Berg, R. P. (2014). The networked brand identity: Management support tool for tension analysis in brand identity networks concerning privacy:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:87d5c245-2cfe-4117-8b0b-2d937f86f93d

Chicago Manual of Style (16th Edition):

Van den Berg, R P. “The networked brand identity: Management support tool for tension analysis in brand identity networks concerning privacy:.” 2014. Masters Thesis, Delft University of Technology. Accessed July 17, 2019. http://resolver.tudelft.nl/uuid:87d5c245-2cfe-4117-8b0b-2d937f86f93d.

MLA Handbook (7th Edition):

Van den Berg, R P. “The networked brand identity: Management support tool for tension analysis in brand identity networks concerning privacy:.” 2014. Web. 17 Jul 2019.

Vancouver:

Van den Berg RP. The networked brand identity: Management support tool for tension analysis in brand identity networks concerning privacy:. [Internet] [Masters thesis]. Delft University of Technology; 2014. [cited 2019 Jul 17]. Available from: http://resolver.tudelft.nl/uuid:87d5c245-2cfe-4117-8b0b-2d937f86f93d.

Council of Science Editors:

Van den Berg RP. The networked brand identity: Management support tool for tension analysis in brand identity networks concerning privacy:. [Masters Thesis]. Delft University of Technology; 2014. Available from: http://resolver.tudelft.nl/uuid:87d5c245-2cfe-4117-8b0b-2d937f86f93d


University of Newcastle

11. Fok, Yiu Cheung George. A comparative study of legislation affecting privacy and personalization factors of website design in Australia, Singapore and Hong Kong.

Degree: 2012, University of Newcastle

Professional Doctorate - Doctor of Business Administration (DBA)

This paper focused on website design factors with respect to online websites access by consumers resulting in… (more)

Subjects/Keywords: data privacy law; legislative threats; website design factors; legislative impacts; Singapore Model Data Protection Codes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fok, Y. C. G. (2012). A comparative study of legislation affecting privacy and personalization factors of website design in Australia, Singapore and Hong Kong. (Thesis). University of Newcastle. Retrieved from http://hdl.handle.net/1959.13/931161

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fok, Yiu Cheung George. “A comparative study of legislation affecting privacy and personalization factors of website design in Australia, Singapore and Hong Kong.” 2012. Thesis, University of Newcastle. Accessed July 17, 2019. http://hdl.handle.net/1959.13/931161.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fok, Yiu Cheung George. “A comparative study of legislation affecting privacy and personalization factors of website design in Australia, Singapore and Hong Kong.” 2012. Web. 17 Jul 2019.

Vancouver:

Fok YCG. A comparative study of legislation affecting privacy and personalization factors of website design in Australia, Singapore and Hong Kong. [Internet] [Thesis]. University of Newcastle; 2012. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/1959.13/931161.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fok YCG. A comparative study of legislation affecting privacy and personalization factors of website design in Australia, Singapore and Hong Kong. [Thesis]. University of Newcastle; 2012. Available from: http://hdl.handle.net/1959.13/931161

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

12. Arias, Jahaivis M. Privacy in the context of Smart Home Environments : Based upon a survey of experts.

Degree: Radio Systems Laboratory (RS Lab), 2014, KTH

Smart environments, particularly smart homes have become an increasingly popular topic for research and real world implementations. Despite the popularity of this topic, there… (more)

Subjects/Keywords: Privacy; Smart environments; Smart Homes; Ubiquitous Computing; Users’ Privacy Concerns; IUIPC Model; Integritet; Intelligenta omgivningar; Smart hem; Ubika datasystem; Användarintegretet; IUIPC ramverket

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Arias, J. M. (2014). Privacy in the context of Smart Home Environments : Based upon a survey of experts. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-145850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Arias, Jahaivis M. “Privacy in the context of Smart Home Environments : Based upon a survey of experts.” 2014. Thesis, KTH. Accessed July 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-145850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Arias, Jahaivis M. “Privacy in the context of Smart Home Environments : Based upon a survey of experts.” 2014. Web. 17 Jul 2019.

Vancouver:

Arias JM. Privacy in the context of Smart Home Environments : Based upon a survey of experts. [Internet] [Thesis]. KTH; 2014. [cited 2019 Jul 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-145850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Arias JM. Privacy in the context of Smart Home Environments : Based upon a survey of experts. [Thesis]. KTH; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-145850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Koukovini, Maria. Εγγενής ενσωμάτωση ιδιωτικότητας σε τεχνολογίες λογισμικού προσανατολισμένου σε υπηρεσίες.

Degree: 2014, National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ)

Service-oriented architectures constitute a prominent technology in current distributed, heterogeneous and dynamic environments. However, they are in many cases characterised by serious privacy implications, since… (more)

Subjects/Keywords: Ιδιωτικότητα; Ιδιωτικότητα εκ σχεδιασμού; Τεχνολογίες λογισμικού προσανατολισμένου σε υπηρεσίες; Ροή εργασιών; Νομοθεσία προστασίας προσωπικών δεδομένων; Απαιτήσεις ιδιωτικότητας; Σχεδιασμός μοντέλου ροής εργασιών; Επαλήθευση ροών εργασιών; Εκτέλεση ροών εργασιών με επίγνωση ιδιωτικότητας; Σημασιολογικό μοντέλο; Οντολογίες; Privacy; Privacy by design; Service-oriented architectures; Workflows; Personal data protection legislation; Privacy requirements; Workflow model specification; Workflow verification; Privacy-aware workflow execution; Semantic model; Ontologies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koukovini, M. (2014). Εγγενής ενσωμάτωση ιδιωτικότητας σε τεχνολογίες λογισμικού προσανατολισμένου σε υπηρεσίες. (Thesis). National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ). Retrieved from http://hdl.handle.net/10442/hedi/39569

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koukovini, Maria. “Εγγενής ενσωμάτωση ιδιωτικότητας σε τεχνολογίες λογισμικού προσανατολισμένου σε υπηρεσίες.” 2014. Thesis, National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ). Accessed July 17, 2019. http://hdl.handle.net/10442/hedi/39569.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koukovini, Maria. “Εγγενής ενσωμάτωση ιδιωτικότητας σε τεχνολογίες λογισμικού προσανατολισμένου σε υπηρεσίες.” 2014. Web. 17 Jul 2019.

Vancouver:

Koukovini M. Εγγενής ενσωμάτωση ιδιωτικότητας σε τεχνολογίες λογισμικού προσανατολισμένου σε υπηρεσίες. [Internet] [Thesis]. National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ); 2014. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/10442/hedi/39569.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koukovini M. Εγγενής ενσωμάτωση ιδιωτικότητας σε τεχνολογίες λογισμικού προσανατολισμένου σε υπηρεσίες. [Thesis]. National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ); 2014. Available from: http://hdl.handle.net/10442/hedi/39569

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Loughborough University

14. McKenna, Eoghan. Demand response of domestic consumers to dynamic electricity pricing in low-carbon power systems.

Degree: PhD, 2013, Loughborough University

 The ability for domestic consumers to provide demand response to dynamic electricity pricing will become increasingly valuable for integrating the high penetrations of renewables that… (more)

Subjects/Keywords: Demand response; Flexible demand; Low-carbon electricity; Dynamic pricing; Photovoltaic; Feed-in tariff; Data privacy; Behavioural economics; Battery model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McKenna, E. (2013). Demand response of domestic consumers to dynamic electricity pricing in low-carbon power systems. (Doctoral Dissertation). Loughborough University. Retrieved from https://dspace.lboro.ac.uk/2134/12120 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.570218

Chicago Manual of Style (16th Edition):

McKenna, Eoghan. “Demand response of domestic consumers to dynamic electricity pricing in low-carbon power systems.” 2013. Doctoral Dissertation, Loughborough University. Accessed July 17, 2019. https://dspace.lboro.ac.uk/2134/12120 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.570218.

MLA Handbook (7th Edition):

McKenna, Eoghan. “Demand response of domestic consumers to dynamic electricity pricing in low-carbon power systems.” 2013. Web. 17 Jul 2019.

Vancouver:

McKenna E. Demand response of domestic consumers to dynamic electricity pricing in low-carbon power systems. [Internet] [Doctoral dissertation]. Loughborough University; 2013. [cited 2019 Jul 17]. Available from: https://dspace.lboro.ac.uk/2134/12120 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.570218.

Council of Science Editors:

McKenna E. Demand response of domestic consumers to dynamic electricity pricing in low-carbon power systems. [Doctoral Dissertation]. Loughborough University; 2013. Available from: https://dspace.lboro.ac.uk/2134/12120 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.570218


University of Colorado

15. Bhagat, Nikhil Hemant. Estimating the Value of Online Smartphone Privacy.

Degree: MS, 2014, University of Colorado

  The research estimates the value of online Smartphone privacy using Statistical regression models. Evidences examine that consumers are forced to provide their personal information… (more)

Subjects/Keywords: Android Market; Censored Regression; Hedonic Model; Linear Regression; Privacy; Smartphone Applications; Economic Theory; Information Security; Mathematics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bhagat, N. H. (2014). Estimating the Value of Online Smartphone Privacy. (Masters Thesis). University of Colorado. Retrieved from http://scholar.colorado.edu/tlen_gradetds/4

Chicago Manual of Style (16th Edition):

Bhagat, Nikhil Hemant. “Estimating the Value of Online Smartphone Privacy.” 2014. Masters Thesis, University of Colorado. Accessed July 17, 2019. http://scholar.colorado.edu/tlen_gradetds/4.

MLA Handbook (7th Edition):

Bhagat, Nikhil Hemant. “Estimating the Value of Online Smartphone Privacy.” 2014. Web. 17 Jul 2019.

Vancouver:

Bhagat NH. Estimating the Value of Online Smartphone Privacy. [Internet] [Masters thesis]. University of Colorado; 2014. [cited 2019 Jul 17]. Available from: http://scholar.colorado.edu/tlen_gradetds/4.

Council of Science Editors:

Bhagat NH. Estimating the Value of Online Smartphone Privacy. [Masters Thesis]. University of Colorado; 2014. Available from: http://scholar.colorado.edu/tlen_gradetds/4


University of Kansas

16. Webb, Nathan G. Managing the Openness-Closedness Dialectic: How Graduate Teaching Assistants Handle the Tension.

Degree: PhD, Communication Studies, 2012, University of Kansas

 Graduate teaching assistants (GTAs) are a pervasive part of undergraduate education. When interacting with undergraduate students, GTAs must balance a tension of being a friend… (more)

Subjects/Keywords: Communication; Affective learning model; Communication privacy management; Graduate teaching assistants; Instructor-student relationships; Interpersonal communication; Relational dialectics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Webb, N. G. (2012). Managing the Openness-Closedness Dialectic: How Graduate Teaching Assistants Handle the Tension. (Doctoral Dissertation). University of Kansas. Retrieved from http://hdl.handle.net/1808/10834

Chicago Manual of Style (16th Edition):

Webb, Nathan G. “Managing the Openness-Closedness Dialectic: How Graduate Teaching Assistants Handle the Tension.” 2012. Doctoral Dissertation, University of Kansas. Accessed July 17, 2019. http://hdl.handle.net/1808/10834.

MLA Handbook (7th Edition):

Webb, Nathan G. “Managing the Openness-Closedness Dialectic: How Graduate Teaching Assistants Handle the Tension.” 2012. Web. 17 Jul 2019.

Vancouver:

Webb NG. Managing the Openness-Closedness Dialectic: How Graduate Teaching Assistants Handle the Tension. [Internet] [Doctoral dissertation]. University of Kansas; 2012. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/1808/10834.

Council of Science Editors:

Webb NG. Managing the Openness-Closedness Dialectic: How Graduate Teaching Assistants Handle the Tension. [Doctoral Dissertation]. University of Kansas; 2012. Available from: http://hdl.handle.net/1808/10834


Boise State University

17. Dhakal, Nitish. Predicting Friendship Strength in Facebook.

Degree: 2017, Boise State University

 Effective friend classification in Online Social Networks (OSN) has many benefits in privacy. Anything posted by the user in social networks like Facebook is distributed… (more)

Subjects/Keywords: friendship strength; privacy preservation; social network; facebook; friend classification; supervised friendship strength model; Computer Sciences; Physical Sciences and Mathematics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dhakal, N. (2017). Predicting Friendship Strength in Facebook. (Thesis). Boise State University. Retrieved from https://scholarworks.boisestate.edu/td/1251

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dhakal, Nitish. “Predicting Friendship Strength in Facebook.” 2017. Thesis, Boise State University. Accessed July 17, 2019. https://scholarworks.boisestate.edu/td/1251.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dhakal, Nitish. “Predicting Friendship Strength in Facebook.” 2017. Web. 17 Jul 2019.

Vancouver:

Dhakal N. Predicting Friendship Strength in Facebook. [Internet] [Thesis]. Boise State University; 2017. [cited 2019 Jul 17]. Available from: https://scholarworks.boisestate.edu/td/1251.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dhakal N. Predicting Friendship Strength in Facebook. [Thesis]. Boise State University; 2017. Available from: https://scholarworks.boisestate.edu/td/1251

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université Catholique de Louvain

18. Peters, Thomas. Privacy enhancing cryptographic mechanisms with public verifiability.

Degree: 2014, Université Catholique de Louvain

Technology is linking the slightest of our actions to the virtual world. In such connected environments, cryptography aims at building schemes with provable security in… (more)

Subjects/Keywords: Cryptography; Zero-Knowledge Proofs; Encryption Schemes; Digital Signatures; Public-key; Provable Security; Privacy; Public Verifiability; Standart-model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peters, T. (2014). Privacy enhancing cryptographic mechanisms with public verifiability. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/144019

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Peters, Thomas. “Privacy enhancing cryptographic mechanisms with public verifiability.” 2014. Thesis, Université Catholique de Louvain. Accessed July 17, 2019. http://hdl.handle.net/2078.1/144019.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Peters, Thomas. “Privacy enhancing cryptographic mechanisms with public verifiability.” 2014. Web. 17 Jul 2019.

Vancouver:

Peters T. Privacy enhancing cryptographic mechanisms with public verifiability. [Internet] [Thesis]. Université Catholique de Louvain; 2014. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/2078.1/144019.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Peters T. Privacy enhancing cryptographic mechanisms with public verifiability. [Thesis]. Université Catholique de Louvain; 2014. Available from: http://hdl.handle.net/2078.1/144019

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Žirovnik, Janez. Procesni model presojanja posegov obveščevalnih služb v komunikacijsko zasebnost kot logistični izziv.

Degree: 2016, Univerza v Mariboru

Država varuje človekove pravice in temeljne svoboščine. Vendar dopušča možnosti, da se človekove pravice in temeljne svoboščine pod določenimi pogoji omejijo. Država lahko omeji človekovih… (more)

Subjects/Keywords: procesni model; presojanje posegov; komunikacijska zasebnost; obveščevalna dejavnost; zakonito prestrezanje; procedural model; judging intrusions; communications privacy; intelligence; legal interception; info:eu-repo/classification/udc/351.74/.76

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Žirovnik, J. (2016). Procesni model presojanja posegov obveščevalnih služb v komunikacijsko zasebnost kot logistični izziv. (Doctoral Dissertation). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=57671 ; https://dk.um.si/Dokument.php?id=107010&dn= ; https://dk.um.si/Dokument.php?id=107013&dn= ; http://www.cobiss.si/scripts/cobiss?command=DISPLAY&base=cobib&rid=512788797&fmt=11

Chicago Manual of Style (16th Edition):

Žirovnik, Janez. “Procesni model presojanja posegov obveščevalnih služb v komunikacijsko zasebnost kot logistični izziv.” 2016. Doctoral Dissertation, Univerza v Mariboru. Accessed July 17, 2019. https://dk.um.si/IzpisGradiva.php?id=57671 ; https://dk.um.si/Dokument.php?id=107010&dn= ; https://dk.um.si/Dokument.php?id=107013&dn= ; http://www.cobiss.si/scripts/cobiss?command=DISPLAY&base=cobib&rid=512788797&fmt=11.

MLA Handbook (7th Edition):

Žirovnik, Janez. “Procesni model presojanja posegov obveščevalnih služb v komunikacijsko zasebnost kot logistični izziv.” 2016. Web. 17 Jul 2019.

Vancouver:

Žirovnik J. Procesni model presojanja posegov obveščevalnih služb v komunikacijsko zasebnost kot logistični izziv. [Internet] [Doctoral dissertation]. Univerza v Mariboru; 2016. [cited 2019 Jul 17]. Available from: https://dk.um.si/IzpisGradiva.php?id=57671 ; https://dk.um.si/Dokument.php?id=107010&dn= ; https://dk.um.si/Dokument.php?id=107013&dn= ; http://www.cobiss.si/scripts/cobiss?command=DISPLAY&base=cobib&rid=512788797&fmt=11.

Council of Science Editors:

Žirovnik J. Procesni model presojanja posegov obveščevalnih služb v komunikacijsko zasebnost kot logistični izziv. [Doctoral Dissertation]. Univerza v Mariboru; 2016. Available from: https://dk.um.si/IzpisGradiva.php?id=57671 ; https://dk.um.si/Dokument.php?id=107010&dn= ; https://dk.um.si/Dokument.php?id=107013&dn= ; http://www.cobiss.si/scripts/cobiss?command=DISPLAY&base=cobib&rid=512788797&fmt=11


Brno University of Technology

20. Šidó, Balázs. De-identifikace osob na základě primárních biometrických znaků .

Degree: 2015, Brno University of Technology

 Tato bakalařska prace se zaobira různými metodami pro ochranu soukromi osob pomoci de-identifikace na zakladě primarnich biometrickych znaků. Prvni kapitola popisuje de-identifikace obličeje zakladnimi, primitivnimi… (more)

Subjects/Keywords: De-identifikace obličeje; De-identifikace hlasu; Aktivni model vzhledu; zachovani kvality dat; ochrana soukromi; Face De-identification; Voice De-identification; Active Appearance Model; data utility preservation; privacy protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Šidó, B. (2015). De-identifikace osob na základě primárních biometrických znaků . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/41317

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Šidó, Balázs. “De-identifikace osob na základě primárních biometrických znaků .” 2015. Thesis, Brno University of Technology. Accessed July 17, 2019. http://hdl.handle.net/11012/41317.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Šidó, Balázs. “De-identifikace osob na základě primárních biometrických znaků .” 2015. Web. 17 Jul 2019.

Vancouver:

Šidó B. De-identifikace osob na základě primárních biometrických znaků . [Internet] [Thesis]. Brno University of Technology; 2015. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/11012/41317.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Šidó B. De-identifikace osob na základě primárních biometrických znaků . [Thesis]. Brno University of Technology; 2015. Available from: http://hdl.handle.net/11012/41317

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Ben Fredj, Feten. Méthode et outil d’anonymisation des données sensibles : Method and tool for anonymization sensitive data.

Degree: Docteur es, Informatique, 2017, Paris, CNAM; Université de Sfax (Tunisie). Faculté des Sciences économiques et de gestion

L’anonymisation des données personnelles requiert l’utilisation d’algorithmes complexes permettant de minimiser le risque de ré-identification tout en préservant l’utilité des données. Dans cette thèse, nous… (more)

Subjects/Keywords: Protection de la vie privée; Anonymisation; Guidage; Approche guidée par les modèles; Ontologie; Privacy; Anonymization; Guidelines; Model-driven approach; Ontology; 005.8; 302.231

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ben Fredj, F. (2017). Méthode et outil d’anonymisation des données sensibles : Method and tool for anonymization sensitive data. (Doctoral Dissertation). Paris, CNAM; Université de Sfax (Tunisie). Faculté des Sciences économiques et de gestion. Retrieved from http://www.theses.fr/2017CNAM1128

Chicago Manual of Style (16th Edition):

Ben Fredj, Feten. “Méthode et outil d’anonymisation des données sensibles : Method and tool for anonymization sensitive data.” 2017. Doctoral Dissertation, Paris, CNAM; Université de Sfax (Tunisie). Faculté des Sciences économiques et de gestion. Accessed July 17, 2019. http://www.theses.fr/2017CNAM1128.

MLA Handbook (7th Edition):

Ben Fredj, Feten. “Méthode et outil d’anonymisation des données sensibles : Method and tool for anonymization sensitive data.” 2017. Web. 17 Jul 2019.

Vancouver:

Ben Fredj F. Méthode et outil d’anonymisation des données sensibles : Method and tool for anonymization sensitive data. [Internet] [Doctoral dissertation]. Paris, CNAM; Université de Sfax (Tunisie). Faculté des Sciences économiques et de gestion; 2017. [cited 2019 Jul 17]. Available from: http://www.theses.fr/2017CNAM1128.

Council of Science Editors:

Ben Fredj F. Méthode et outil d’anonymisation des données sensibles : Method and tool for anonymization sensitive data. [Doctoral Dissertation]. Paris, CNAM; Université de Sfax (Tunisie). Faculté des Sciences économiques et de gestion; 2017. Available from: http://www.theses.fr/2017CNAM1128

22. Bennett, Phillipa. Hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules, A.

Degree: PhD, Computer Science, 2017, Colorado State University

 Many of today's computing systems must show evidence of conformance to rules. The rules may come from business protocol choices or from multi-jurisdictional sources. Some… (more)

Subjects/Keywords: Model Checking; Rule Conformance Analysis; Modeling and Analysis; HIPAA Privacy

…21 3.2 Model Checking… …vii 4.2.3 Model Execution Results in the Alloy Analyzer… …32 4.3.3 Promela Model Verification Results in Spin… …33 4.3.3.1 Evaluating Promela/Spin on a Small Model… …33 4.3.3.2 NJH Model… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bennett, P. (2017). Hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/183853

Chicago Manual of Style (16th Edition):

Bennett, Phillipa. “Hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules, A.” 2017. Doctoral Dissertation, Colorado State University. Accessed July 17, 2019. http://hdl.handle.net/10217/183853.

MLA Handbook (7th Edition):

Bennett, Phillipa. “Hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules, A.” 2017. Web. 17 Jul 2019.

Vancouver:

Bennett P. Hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules, A. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/10217/183853.

Council of Science Editors:

Bennett P. Hybrid model checking approach to analysing rule conformance applied to HIPAA privacy rules, A. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/183853

23. Machara Marquez, Samer. Models and algorithms for managing quality of context and respect for privacy in the Internet of Things : Modèles et algorithmes pour la gestion de la qualité du contexte et de respect de la vie privée dans l'Internet des Objets.

Degree: Docteur es, Informatique, 2015, Paris Saclay

 L’Internet des Objets (IdO) est un nouveau paradigme, dont l’idée de base est d’avoir un grand nombre d’objets de façon ubiquitaire. Ces objets sont capables… (more)

Subjects/Keywords: Internet des objets; Qualité de contexte; Respect de la vie privée; Confiance; Ingénierie dirigée par les modèles; Internet of Things; Quality of Context; Privacy; Trust; Model Driven Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Machara Marquez, S. (2015). Models and algorithms for managing quality of context and respect for privacy in the Internet of Things : Modèles et algorithmes pour la gestion de la qualité du contexte et de respect de la vie privée dans l'Internet des Objets. (Doctoral Dissertation). Paris Saclay. Retrieved from http://www.theses.fr/2015SACLL005

Chicago Manual of Style (16th Edition):

Machara Marquez, Samer. “Models and algorithms for managing quality of context and respect for privacy in the Internet of Things : Modèles et algorithmes pour la gestion de la qualité du contexte et de respect de la vie privée dans l'Internet des Objets.” 2015. Doctoral Dissertation, Paris Saclay. Accessed July 17, 2019. http://www.theses.fr/2015SACLL005.

MLA Handbook (7th Edition):

Machara Marquez, Samer. “Models and algorithms for managing quality of context and respect for privacy in the Internet of Things : Modèles et algorithmes pour la gestion de la qualité du contexte et de respect de la vie privée dans l'Internet des Objets.” 2015. Web. 17 Jul 2019.

Vancouver:

Machara Marquez S. Models and algorithms for managing quality of context and respect for privacy in the Internet of Things : Modèles et algorithmes pour la gestion de la qualité du contexte et de respect de la vie privée dans l'Internet des Objets. [Internet] [Doctoral dissertation]. Paris Saclay; 2015. [cited 2019 Jul 17]. Available from: http://www.theses.fr/2015SACLL005.

Council of Science Editors:

Machara Marquez S. Models and algorithms for managing quality of context and respect for privacy in the Internet of Things : Modèles et algorithmes pour la gestion de la qualité du contexte et de respect de la vie privée dans l'Internet des Objets. [Doctoral Dissertation]. Paris Saclay; 2015. Available from: http://www.theses.fr/2015SACLL005


Indian Institute of Science

24. Kumar, Vikas. Construction of Secure and Efficient Private Set Intersection Protocol.

Degree: 2013, Indian Institute of Science

 Private set intersection(PSI) is a two party protocol where both parties possess a private set and at the end of the protocol, one party (client)… (more)

Subjects/Keywords: Data Protection; Private Set Intersection (PSI); Provable Secure Private Set Intersection Protocols; Simulation-based Proofs; Malicious Model; Secure Two-Party Computation; Cryptographic Protocols; Honest-But-Curious Model; Data Security Models; Data Processing - Privacy Preserving Protocols; HbC Model; Gap Diffie-Hellman Setting; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kumar, V. (2013). Construction of Secure and Efficient Private Set Intersection Protocol. (Thesis). Indian Institute of Science. Retrieved from http://hdl.handle.net/2005/3277

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kumar, Vikas. “Construction of Secure and Efficient Private Set Intersection Protocol.” 2013. Thesis, Indian Institute of Science. Accessed July 17, 2019. http://hdl.handle.net/2005/3277.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kumar, Vikas. “Construction of Secure and Efficient Private Set Intersection Protocol.” 2013. Web. 17 Jul 2019.

Vancouver:

Kumar V. Construction of Secure and Efficient Private Set Intersection Protocol. [Internet] [Thesis]. Indian Institute of Science; 2013. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/2005/3277.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kumar V. Construction of Secure and Efficient Private Set Intersection Protocol. [Thesis]. Indian Institute of Science; 2013. Available from: http://hdl.handle.net/2005/3277

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. 荒井, 正和. ビッグデータ利活用とプライバシー保護の両立を実現するプライバシーマネジメントモデルの提案.

Degree: Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学

Supervisor:小坂 満隆

知識科学研究科

修士

Subjects/Keywords: ビッグデータ; big data; パーソナルデータ; personal data; プライバシーリスク; privacy risk; アクティブプライバシーマネジメントモデル; active privacy management model; リアクティブアプローチ; Re-active approach; 価値変換チェーン; value conversion chain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

荒井, . (n.d.). ビッグデータ利活用とプライバシー保護の両立を実現するプライバシーマネジメントモデルの提案. (Thesis). Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10119/13730

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

荒井, 正和. “ビッグデータ利活用とプライバシー保護の両立を実現するプライバシーマネジメントモデルの提案.” Thesis, Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学. Accessed July 17, 2019. http://hdl.handle.net/10119/13730.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

荒井, 正和. “ビッグデータ利活用とプライバシー保護の両立を実現するプライバシーマネジメントモデルの提案.” Web. 17 Jul 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

荒井 . ビッグデータ利活用とプライバシー保護の両立を実現するプライバシーマネジメントモデルの提案. [Internet] [Thesis]. Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学; [cited 2019 Jul 17]. Available from: http://hdl.handle.net/10119/13730.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

荒井 . ビッグデータ利活用とプライバシー保護の両立を実現するプライバシーマネジメントモデルの提案. [Thesis]. Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学; Available from: http://hdl.handle.net/10119/13730

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

26. Wiese, Lena. Preprocessing for controlled query evaluation in complete first-order databases.

Degree: 2009, Technische Universität Dortmund

 This dissertation investigates a mechanism for confidentiality preservation in first-order logic databases. The logical basis is given by the inference control framework of Controlled Query… (more)

Subjects/Keywords: Confidentiality; Database; Data privacy; Datenbank; Datensicherheit; First-order logic; Inference control; Inferenzkontrolle; Informationssysteme; Information systems; Logic in information systems; Logik erster Ordnung; Logik in Informationssystemen; Model generation; Modellgenerierung; Security; Sicherheit; Vertraulichkeit; 004

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wiese, L. (2009). Preprocessing for controlled query evaluation in complete first-order databases. (Thesis). Technische Universität Dortmund. Retrieved from http://hdl.handle.net/2003/26383

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wiese, Lena. “Preprocessing for controlled query evaluation in complete first-order databases.” 2009. Thesis, Technische Universität Dortmund. Accessed July 17, 2019. http://hdl.handle.net/2003/26383.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wiese, Lena. “Preprocessing for controlled query evaluation in complete first-order databases.” 2009. Web. 17 Jul 2019.

Vancouver:

Wiese L. Preprocessing for controlled query evaluation in complete first-order databases. [Internet] [Thesis]. Technische Universität Dortmund; 2009. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/2003/26383.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wiese L. Preprocessing for controlled query evaluation in complete first-order databases. [Thesis]. Technische Universität Dortmund; 2009. Available from: http://hdl.handle.net/2003/26383

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

27. Papagiannakopoulou, Eugenia. Σημασιολογικό μοντέλο ελέγχου πρόσβασης για κατανεμημένα περιβάλλοντα.

Degree: 2014, National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ)

A current trend in the evolution of software systems consists in moving from the logic ofvertical integration towards the adoption of more flexible architectures based… (more)

Subjects/Keywords: Έλεγχος πρόσβασης και χρήσης; Κατανεμημένα περιβάλλοντα; Ιδιωτικότητα; Προστασία προσωπικών δεδομένων; Σημασιολογικό μοντέλο; Οντολογία; Διαχωρισμός και σύζευξη καθηκόντων; Access and usage control; Distributed environments; Privacy; Personal data protection; Semantic model; Ontology; Separation and binding of duty

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Papagiannakopoulou, E. (2014). Σημασιολογικό μοντέλο ελέγχου πρόσβασης για κατανεμημένα περιβάλλοντα. (Thesis). National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ). Retrieved from http://hdl.handle.net/10442/hedi/39508

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Papagiannakopoulou, Eugenia. “Σημασιολογικό μοντέλο ελέγχου πρόσβασης για κατανεμημένα περιβάλλοντα.” 2014. Thesis, National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ). Accessed July 17, 2019. http://hdl.handle.net/10442/hedi/39508.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Papagiannakopoulou, Eugenia. “Σημασιολογικό μοντέλο ελέγχου πρόσβασης για κατανεμημένα περιβάλλοντα.” 2014. Web. 17 Jul 2019.

Vancouver:

Papagiannakopoulou E. Σημασιολογικό μοντέλο ελέγχου πρόσβασης για κατανεμημένα περιβάλλοντα. [Internet] [Thesis]. National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ); 2014. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/10442/hedi/39508.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Papagiannakopoulou E. Σημασιολογικό μοντέλο ελέγχου πρόσβασης για κατανεμημένα περιβάλλοντα. [Thesis]. National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ); 2014. Available from: http://hdl.handle.net/10442/hedi/39508

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

28. Yang, Yuhao. Protecting attributes and contents in online social networks.

Degree: PhD, Electrical Engineering & Computer Science, 2014, University of Kansas

 With the extreme popularity of online social networks, security and privacy issues become critical. In particular, it is important to protect user privacy without preventing… (more)

Subjects/Keywords: Computer science; Social structure; Attack Model; Clustering; Online Social Network; Social Circle; User Privacy

privacy definition of “un-identifiability.” In this model, when a record (user profile)… …a machine learning model to predict and configure users’ privacy rules based on limited… …it also causes some privacy issues. The extreme popularity of online social networks has… …privacy issues arise. In the literature, studies have shown a massive disconnection between… …users’ privacy perceptions and their behavior–widely known as the privacy paradox. That is… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, Y. (2014). Protecting attributes and contents in online social networks. (Doctoral Dissertation). University of Kansas. Retrieved from http://hdl.handle.net/1808/18413

Chicago Manual of Style (16th Edition):

Yang, Yuhao. “Protecting attributes and contents in online social networks.” 2014. Doctoral Dissertation, University of Kansas. Accessed July 17, 2019. http://hdl.handle.net/1808/18413.

MLA Handbook (7th Edition):

Yang, Yuhao. “Protecting attributes and contents in online social networks.” 2014. Web. 17 Jul 2019.

Vancouver:

Yang Y. Protecting attributes and contents in online social networks. [Internet] [Doctoral dissertation]. University of Kansas; 2014. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/1808/18413.

Council of Science Editors:

Yang Y. Protecting attributes and contents in online social networks. [Doctoral Dissertation]. University of Kansas; 2014. Available from: http://hdl.handle.net/1808/18413


University of Saskatchewan

29. Anwar, Mohd M. An identity- and trust-based computational model for privacy.

Degree: 2008, University of Saskatchewan

 The seemingly contradictory need and want of online users for information sharing and privacy has inspired this thesis work. The crux of the problem lies… (more)

Subjects/Keywords: e-learning environment; computational model; reputation-based trust; identity management; role- and relationship-based identity management; privacy; contextual partial identity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anwar, M. M. (2008). An identity- and trust-based computational model for privacy. (Thesis). University of Saskatchewan. Retrieved from http://hdl.handle.net/10388/etd-01022009-184502

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Anwar, Mohd M. “An identity- and trust-based computational model for privacy.” 2008. Thesis, University of Saskatchewan. Accessed July 17, 2019. http://hdl.handle.net/10388/etd-01022009-184502.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Anwar, Mohd M. “An identity- and trust-based computational model for privacy.” 2008. Web. 17 Jul 2019.

Vancouver:

Anwar MM. An identity- and trust-based computational model for privacy. [Internet] [Thesis]. University of Saskatchewan; 2008. [cited 2019 Jul 17]. Available from: http://hdl.handle.net/10388/etd-01022009-184502.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Anwar MM. An identity- and trust-based computational model for privacy. [Thesis]. University of Saskatchewan; 2008. Available from: http://hdl.handle.net/10388/etd-01022009-184502

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université du Luxembourg

30. Delerue Arriaga, Afonso. Private Functional Encryption – Hiding What Cannot Be Learned Through Function Evaluation.

Degree: 2017, Université du Luxembourg

 Functional encryption (FE) is a generalization of many commonly employed crypto- graphic primitives, such as keyword search encryption (KS), identity-based encryption (IBE), inner-product encryption (IPE)… (more)

Subjects/Keywords: functional encryption; function privacy; obfuscation; keyword search; inner-product encryption; identity-based encryption; updatable functional encryption; RAM model; persistent memory; Engineering, computing & technology :: Computer science [C05]; Ingénierie, informatique & technologie :: Sciences informatiques [C05]

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Delerue Arriaga, A. (2017). Private Functional Encryption – Hiding What Cannot Be Learned Through Function Evaluation. (Doctoral Dissertation). Université du Luxembourg. Retrieved from http://orbilu.uni.lu/handle/10993/29922

Chicago Manual of Style (16th Edition):

Delerue Arriaga, Afonso. “Private Functional Encryption – Hiding What Cannot Be Learned Through Function Evaluation.” 2017. Doctoral Dissertation, Université du Luxembourg. Accessed July 17, 2019. http://orbilu.uni.lu/handle/10993/29922.

MLA Handbook (7th Edition):

Delerue Arriaga, Afonso. “Private Functional Encryption – Hiding What Cannot Be Learned Through Function Evaluation.” 2017. Web. 17 Jul 2019.

Vancouver:

Delerue Arriaga A. Private Functional Encryption – Hiding What Cannot Be Learned Through Function Evaluation. [Internet] [Doctoral dissertation]. Université du Luxembourg; 2017. [cited 2019 Jul 17]. Available from: http://orbilu.uni.lu/handle/10993/29922.

Council of Science Editors:

Delerue Arriaga A. Private Functional Encryption – Hiding What Cannot Be Learned Through Function Evaluation. [Doctoral Dissertation]. Université du Luxembourg; 2017. Available from: http://orbilu.uni.lu/handle/10993/29922

[1] [2]

.