Skip to main content
European Commission logo
polski polski
CORDIS - Wyniki badań wspieranych przez UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Enabling Crowd-sourcing based privacy protection for smartphone applications, websites and Internet of Things deployments

CORDIS oferuje możliwość skorzystania z odnośników do publicznie dostępnych publikacji i rezultatów projektów realizowanych w ramach programów ramowych HORYZONT.

Odnośniki do rezultatów i publikacji związanych z poszczególnymi projektami 7PR, a także odnośniki do niektórych konkretnych kategorii wyników, takich jak zbiory danych i oprogramowanie, są dynamicznie pobierane z systemu OpenAIRE .

Rezultaty

UPRAAMs and in-depth risk analysis modelling report - updated
Final integration test and validation report

Deliverable 5.3: Final integration test and validation report

Technical risks analysis report

D2.2: Technical risks analysis report

Updated Architecture Design

Deliverable 1.3: Updated Architecture Design

Initial test and validation report

Deliverable 5.2: Initial test and validation report

Integration, tests and validation plan

Deliverable 5.1: Integration, tests and validation plan

Second year report on Technical enablers development.

Deliverable 4.2: Second year report on Technical enablers development.

Requirements Report

Deliverable 1.1: Requirements Report

Initial Architecture Design

Deliverable 1.2: Initial Architecture Design

Legal Framework Analysis Report

D2.1: Legal Framework Analysis Report

Third year report on Technical enablers development

Deliverable 4.3: Third year report on Technical enablers development.

Outreach and dissemination report - Year 1

Deliverable 6.2: Outreach and dissemination report - Year 1

Project presentation

Deliverable 7.1: Project presentation Delivery date: M1; Nature: Report (R); Dissemination level: Public (PU); Deliverable Leader: MI.

First year report on Technical enablers development.

Deliverable 4.1: First year report on Technical enablers development.

UPRAAMs and in-depth risk analysis modelling report

D2.3: UPRAAMs and in-depth risk analysis modelling report

Outreach and dissemination report - Year 3

Deliverable 6.4: Outreach and dissemination report - Year 3

Outreach and dissemination report - Year 2

Deliverable 6.3: Outreach and dissemination report - Year 2

Final Architecture Design

Deliverable 1.4: Final Architecture Design

Voluntary compliance commitment tool (fully operational)

Deliverable 3.4: Voluntary compliance commitment tool (fully operational)

Initial version of knowledge base with privacy assessment

Deliverable 5.4: Initial version of knowledge base with privacy assessment

Assessment tools final report

Deliverable 3.5: Assessment tools final report

Data valuation tool fully operational

Deliverable 3.1: Data valuation tool fully operational

Crowd-sourcing tools for risk assessment (fully operational)

Deliverable 3.2: Crowd-sourcing tools for risk assessment (fully operational)

Publikacje

Safety-Aware Location Privacy in VANET: Evaluation and Comparison

Autorzy: Karim Emara
Opublikowane w: IEEE Transactions on Vehicular Technology, Numer 66/12, 2017, Strona(/y) 10718-10731, ISSN 0018-9545
Wydawca: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TVT.2017.2736885

Pseudonymization and impacts of Big (personal/anonymous) Data processing in the transition from the Directive 95/46/EC to the new EU General Data Protection Regulation

Autorzy: Luca Bolognini, Camilla Bistolfi
Opublikowane w: Computer Law & Security Review, Numer 33/2, 2017, Strona(/y) 171-181, ISSN 0267-3649
Wydawca: Pergamon Press Ltd.
DOI: 10.1016/j.clsr.2016.11.002

Design of Smart City Systems from a Privacy Perspective

Autorzy: Ståhlbröst, A., Padyab A., Sällström A. and Hollosi D.
Opublikowane w: IADIS International Journal on WWW/Internet, Numer 13, 2015, Strona(/y) 1-16, ISSN 1645-7641
Wydawca: Universidade Aberta

Reflecting on Actions in Living Lab Research

Autorzy: Anna Ståhlbröst, Marita Holst
Opublikowane w: Technology Innovation Management Review, Numer 7(2), 2017, Strona(/y) 27-34, ISSN 1927-0321
Wydawca: Talent First Network 2007–2017

Analysis of Fingerprinting Techniques for Tor Hidden Services

Autorzy: A. Panchenko, A. Mitseva, M. Henze, F. Lanze, K. Wehrle, T. Engel
Opublikowane w: Workshop on Privacy in the Electronic Society (WPES’17), 2017, ISBN 978-1-4503-5175-1
Wydawca: ACM

Crowdsourcing Mechanisms in the Privacy Flag Framework

Autorzy: I.P. Chochliouros, A. Kostopoulos, A.S. Spiliopoulou, S. Ziegler, L. Ladid, N. Alonistioti, M. Belesioti, S. Nikoletseas, V. Vlachos, N. Gligoric, A. Stahlbrost, L. Bolognini, E. Vasilaki, D. Arvanitozisis and E. Sfakianakis.
Opublikowane w: Proceedings of the EuCNC-2018, 2018, Strona(/y) 1-5, ISBN 978-1-5386-1478-5
Wydawca: IEEE, Jozef Stefan Institute, Slovenia, in cooperation with the European Commission

Privacy Flag - A crowdsourcing platform for reporting and managing privacy and security risks

Autorzy: Vasileios Vlachos, Yannis C. Stamatiou, Adelina Madhja, Sotiris Nikoletseas
Opublikowane w: Proceedings of the 21st Pan-Hellenic Conference on Informatics - PCI 2017, 2017, Strona(/y) 1-4, ISBN 9781-450353557
Wydawca: ACM Press
DOI: 10.1145/3139367.3139432

Enabling Crowd-sourcing-based Privacy Risk Assessment in EU - the Privacy Flag Project

Autorzy: Ioannis Chochliouros, Marita Holst, Sébastien Ziegler, Luca Bolognini, Nancy Alonistioti, Makis Stamatelatos, Panagiotis Kontopoulos, George Mourikas, Vasileios Vlachos, Nenad Gligoric
Opublikowane w: Proceedings of the 21st Pan-Hellenic Conference on Informatics - PCI 2017, 2017, Strona(/y) 1-2, ISBN 9781-450353557
Wydawca: ACM Press
DOI: 10.1145/3139367.3139417

Enhancing Privacy Using Crowdsourcing Mechanisms

Autorzy: Alexandros Kostopoulos, Ioannis Chochliouros, Ioanna Papafili, Andreas Drakos
Opublikowane w: Proceedings of the 21st Pan-Hellenic Conference on Informatics - PCI 2017, 2017, Strona(/y) 1-5, ISBN 9781-450353557
Wydawca: ACM Press
DOI: 10.1145/3139367.3139405

Enabling Privacy Protection by using a Universal Privacy Risk Methodology in the context of 5G

Autorzy: Ioannis P. Chochliouros, Evangelos Sfakianakis, Maria Belesioti, Nikolaos Bompetsis and Anastasia S. Spiliopoulou
Opublikowane w: Proceedings of the EuCNC-2016 (The European Conference on Networks and Communication 2016), 2016, Strona(/y) 1-5
Wydawca: European Commission in cooperation with the Natinal technical University of Athens, Greece and the University of Piraeus, Greece

A Formalization of Fingerprinting Techniques

Autorzy: Fabian Lanze, Andriy Panchenko, Thomas Engel
Opublikowane w: 2015 IEEE Trustcom/BigDataSE/ISPA, Numer Vol.1, 2015, Strona(/y) 818-825, ISBN 978-1-4673-7952-6
Wydawca: IEEE
DOI: 10.1109/Trustcom.2015.452

On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds

Autorzy: Andriy Panchenko
Opublikowane w: Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks - Q2SWinet '15, 2015, Strona(/y) 35-42, ISBN 9781-450337571
Wydawca: ACM Press
DOI: 10.1145/2815317.2815325

Privacy Flag – Collective Privacy Protection Scheme Based on Structured Distributed Risk Assessment

Autorzy: S. Ziegler, I. Chochliouros and L. Ladid
Opublikowane w: Proceedings of the IEEE World Forum for Internet of Things 2015; Special Session on IoT Security & Privacy, 2015
Wydawca: IEEE IoT World Forum

Website Fingerprinting at Internet Scale

Autorzy: Panchenko A., Lanze F., Zinnen A., Henze M., Pennekamp J., Wehrle K. and Engel T.
Opublikowane w: Proceedings of the Internet Society (ISOC) Network and Distributed System Security Symposium - (NDSS-2016), 2016, Strona(/y) 1-15, ISBN 1-891562-41-X
Wydawca: ISOC
DOI: 10.14722/ndss.2016.23477

Bringing your data everywhere in the Internet of (every)Thing: a legal reading of the new right to portability

Autorzy: Bistolfi C., Scudiero L. and Ziegler S.
Opublikowane w: Proceedings of the AINA-2016 (The 30th IEEE International Conference on Advanced Information Networking and Applications), 2016, Strona(/y) 1-4
Wydawca: IEEE

Facebook Users Attitudes towards Secondary Use of Personal Information

Autorzy: Ali Padyab, Tero Päivärinta, Anna Ståhlbröst, Birgitta Bergvall-Kåreborn
Opublikowane w: Proceedings of the International Conference on Information Systems 2016 (ICIS-2016), 2016, ISBN 978-0-9966831-3-5
Wydawca: AIS Electronic Library (AISeL)

POSTER - Fingerprinting Tor Hidden Services

Autorzy: Asya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel
Opublikowane w: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Strona(/y) 1766-1768, ISBN 9781-450341394
Wydawca: ACM Press
DOI: 10.1145/2976749.2989054

Ensuring Privacy in 5G-Networks

Autorzy: Alexandros Kostopoulos, Ioannis Chochliouros, Ioanna Papafili and Andreas Drakos
Opublikowane w: Proccedings of the EuCNC-2017, 2017, Strona(/y) 1-5
Wydawca: University of Oulu, Finland, in cooperation with the European Commission

Crowd Sourcing Based Privacy Threat Analysis and Alerting

Autorzy: Adelina Madia, Sotiris Nikoletseas, Ioannis Stamatiou, Dimitrios Tsolovos, Vasileios Vlachos
Opublikowane w: Proccedings of the 3rd International Conference on Cryptography, Cyber Security and Information Warfare (3rd CryCybIW), 2017
Wydawca: Hellenic Military Academy

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników