Skip to main content
European Commission logo
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Enabling Crowd-sourcing based privacy protection for smartphone applications, websites and Internet of Things deployments

CORDIS fournit des liens vers les livrables publics et les publications des projets HORIZON.

Les liens vers les livrables et les publications des projets du 7e PC, ainsi que les liens vers certains types de résultats spécifiques tels que les jeux de données et les logiciels, sont récupérés dynamiquement sur OpenAIRE .

Livrables

UPRAAMs and in-depth risk analysis modelling report - updated
Final integration test and validation report

Deliverable 5.3: Final integration test and validation report

Technical risks analysis report

D2.2: Technical risks analysis report

Updated Architecture Design

Deliverable 1.3: Updated Architecture Design

Initial test and validation report

Deliverable 5.2: Initial test and validation report

Integration, tests and validation plan

Deliverable 5.1: Integration, tests and validation plan

Second year report on Technical enablers development.

Deliverable 4.2: Second year report on Technical enablers development.

Requirements Report

Deliverable 1.1: Requirements Report

Initial Architecture Design

Deliverable 1.2: Initial Architecture Design

Legal Framework Analysis Report

D2.1: Legal Framework Analysis Report

Third year report on Technical enablers development

Deliverable 4.3: Third year report on Technical enablers development.

Outreach and dissemination report - Year 1

Deliverable 6.2: Outreach and dissemination report - Year 1

Project presentation

Deliverable 7.1: Project presentation Delivery date: M1; Nature: Report (R); Dissemination level: Public (PU); Deliverable Leader: MI.

First year report on Technical enablers development.

Deliverable 4.1: First year report on Technical enablers development.

UPRAAMs and in-depth risk analysis modelling report

D2.3: UPRAAMs and in-depth risk analysis modelling report

Outreach and dissemination report - Year 3

Deliverable 6.4: Outreach and dissemination report - Year 3

Outreach and dissemination report - Year 2

Deliverable 6.3: Outreach and dissemination report - Year 2

Final Architecture Design

Deliverable 1.4: Final Architecture Design

Voluntary compliance commitment tool (fully operational)

Deliverable 3.4: Voluntary compliance commitment tool (fully operational)

Initial version of knowledge base with privacy assessment

Deliverable 5.4: Initial version of knowledge base with privacy assessment

Assessment tools final report

Deliverable 3.5: Assessment tools final report

Data valuation tool fully operational

Deliverable 3.1: Data valuation tool fully operational

Crowd-sourcing tools for risk assessment (fully operational)

Deliverable 3.2: Crowd-sourcing tools for risk assessment (fully operational)

Publications

Safety-Aware Location Privacy in VANET: Evaluation and Comparison

Auteurs: Karim Emara
Publié dans: IEEE Transactions on Vehicular Technology, Numéro 66/12, 2017, Page(s) 10718-10731, ISSN 0018-9545
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TVT.2017.2736885

Pseudonymization and impacts of Big (personal/anonymous) Data processing in the transition from the Directive 95/46/EC to the new EU General Data Protection Regulation

Auteurs: Luca Bolognini, Camilla Bistolfi
Publié dans: Computer Law & Security Review, Numéro 33/2, 2017, Page(s) 171-181, ISSN 0267-3649
Éditeur: Pergamon Press Ltd.
DOI: 10.1016/j.clsr.2016.11.002

Design of Smart City Systems from a Privacy Perspective

Auteurs: Ståhlbröst, A., Padyab A., Sällström A. and Hollosi D.
Publié dans: IADIS International Journal on WWW/Internet, Numéro 13, 2015, Page(s) 1-16, ISSN 1645-7641
Éditeur: Universidade Aberta

Reflecting on Actions in Living Lab Research

Auteurs: Anna Ståhlbröst, Marita Holst
Publié dans: Technology Innovation Management Review, Numéro 7(2), 2017, Page(s) 27-34, ISSN 1927-0321
Éditeur: Talent First Network 2007–2017

Analysis of Fingerprinting Techniques for Tor Hidden Services

Auteurs: A. Panchenko, A. Mitseva, M. Henze, F. Lanze, K. Wehrle, T. Engel
Publié dans: Workshop on Privacy in the Electronic Society (WPES’17), 2017, ISBN 978-1-4503-5175-1
Éditeur: ACM

Crowdsourcing Mechanisms in the Privacy Flag Framework

Auteurs: I.P. Chochliouros, A. Kostopoulos, A.S. Spiliopoulou, S. Ziegler, L. Ladid, N. Alonistioti, M. Belesioti, S. Nikoletseas, V. Vlachos, N. Gligoric, A. Stahlbrost, L. Bolognini, E. Vasilaki, D. Arvanitozisis and E. Sfakianakis.
Publié dans: Proceedings of the EuCNC-2018, 2018, Page(s) 1-5, ISBN 978-1-5386-1478-5
Éditeur: IEEE, Jozef Stefan Institute, Slovenia, in cooperation with the European Commission

Privacy Flag - A crowdsourcing platform for reporting and managing privacy and security risks

Auteurs: Vasileios Vlachos, Yannis C. Stamatiou, Adelina Madhja, Sotiris Nikoletseas
Publié dans: Proceedings of the 21st Pan-Hellenic Conference on Informatics - PCI 2017, 2017, Page(s) 1-4, ISBN 9781-450353557
Éditeur: ACM Press
DOI: 10.1145/3139367.3139432

Enabling Crowd-sourcing-based Privacy Risk Assessment in EU - the Privacy Flag Project

Auteurs: Ioannis Chochliouros, Marita Holst, Sébastien Ziegler, Luca Bolognini, Nancy Alonistioti, Makis Stamatelatos, Panagiotis Kontopoulos, George Mourikas, Vasileios Vlachos, Nenad Gligoric
Publié dans: Proceedings of the 21st Pan-Hellenic Conference on Informatics - PCI 2017, 2017, Page(s) 1-2, ISBN 9781-450353557
Éditeur: ACM Press
DOI: 10.1145/3139367.3139417

Enhancing Privacy Using Crowdsourcing Mechanisms

Auteurs: Alexandros Kostopoulos, Ioannis Chochliouros, Ioanna Papafili, Andreas Drakos
Publié dans: Proceedings of the 21st Pan-Hellenic Conference on Informatics - PCI 2017, 2017, Page(s) 1-5, ISBN 9781-450353557
Éditeur: ACM Press
DOI: 10.1145/3139367.3139405

Enabling Privacy Protection by using a Universal Privacy Risk Methodology in the context of 5G

Auteurs: Ioannis P. Chochliouros, Evangelos Sfakianakis, Maria Belesioti, Nikolaos Bompetsis and Anastasia S. Spiliopoulou
Publié dans: Proceedings of the EuCNC-2016 (The European Conference on Networks and Communication 2016), 2016, Page(s) 1-5
Éditeur: European Commission in cooperation with the Natinal technical University of Athens, Greece and the University of Piraeus, Greece

A Formalization of Fingerprinting Techniques

Auteurs: Fabian Lanze, Andriy Panchenko, Thomas Engel
Publié dans: 2015 IEEE Trustcom/BigDataSE/ISPA, Numéro Vol.1, 2015, Page(s) 818-825, ISBN 978-1-4673-7952-6
Éditeur: IEEE
DOI: 10.1109/Trustcom.2015.452

On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds

Auteurs: Andriy Panchenko
Publié dans: Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks - Q2SWinet '15, 2015, Page(s) 35-42, ISBN 9781-450337571
Éditeur: ACM Press
DOI: 10.1145/2815317.2815325

Privacy Flag – Collective Privacy Protection Scheme Based on Structured Distributed Risk Assessment

Auteurs: S. Ziegler, I. Chochliouros and L. Ladid
Publié dans: Proceedings of the IEEE World Forum for Internet of Things 2015; Special Session on IoT Security & Privacy, 2015
Éditeur: IEEE IoT World Forum

Website Fingerprinting at Internet Scale

Auteurs: Panchenko A., Lanze F., Zinnen A., Henze M., Pennekamp J., Wehrle K. and Engel T.
Publié dans: Proceedings of the Internet Society (ISOC) Network and Distributed System Security Symposium - (NDSS-2016), 2016, Page(s) 1-15, ISBN 1-891562-41-X
Éditeur: ISOC
DOI: 10.14722/ndss.2016.23477

Bringing your data everywhere in the Internet of (every)Thing: a legal reading of the new right to portability

Auteurs: Bistolfi C., Scudiero L. and Ziegler S.
Publié dans: Proceedings of the AINA-2016 (The 30th IEEE International Conference on Advanced Information Networking and Applications), 2016, Page(s) 1-4
Éditeur: IEEE

Facebook Users Attitudes towards Secondary Use of Personal Information

Auteurs: Ali Padyab, Tero Päivärinta, Anna Ståhlbröst, Birgitta Bergvall-Kåreborn
Publié dans: Proceedings of the International Conference on Information Systems 2016 (ICIS-2016), 2016, ISBN 978-0-9966831-3-5
Éditeur: AIS Electronic Library (AISeL)

POSTER - Fingerprinting Tor Hidden Services

Auteurs: Asya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel
Publié dans: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Page(s) 1766-1768, ISBN 9781-450341394
Éditeur: ACM Press
DOI: 10.1145/2976749.2989054

Ensuring Privacy in 5G-Networks

Auteurs: Alexandros Kostopoulos, Ioannis Chochliouros, Ioanna Papafili and Andreas Drakos
Publié dans: Proccedings of the EuCNC-2017, 2017, Page(s) 1-5
Éditeur: University of Oulu, Finland, in cooperation with the European Commission

Crowd Sourcing Based Privacy Threat Analysis and Alerting

Auteurs: Adelina Madia, Sotiris Nikoletseas, Ioannis Stamatiou, Dimitrios Tsolovos, Vasileios Vlachos
Publié dans: Proccedings of the 3rd International Conference on Cryptography, Cyber Security and Information Warfare (3rd CryCybIW), 2017
Éditeur: Hellenic Military Academy

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible